Conversation
|
@copilot spellcheck my work |
There was a problem hiding this comment.
Pull request overview
Adds new IAM documentation pages to the docs site and wires them into the Docsify sidebar, supporting the “IAM | Global Rollout” documentation needs.
Changes:
- Added IAM overview documentation (roles + access rules).
- Added IAM Users and Roles page workflow documentation.
- Updated docs sidebar navigation to include the new IAM section.
Reviewed changes
Copilot reviewed 4 out of 4 changed files in this pull request and generated 8 comments.
| File | Description |
|---|---|
| docs/iam/overview.md | Introduces IAM app overview, role definitions, and access constraints. |
| docs/iam/users.md | Documents the Users page workflows: inviting, deleting, and editing roles. |
| docs/iam/roles.md | Documents the Roles page workflow for updating role assignments. |
| docs/_sidebar.md | Adds IAM section links to the documentation sidebar. |
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
docs/iam/overview.md
Outdated
|
|
||
| ### Access | ||
|
|
||
| All users in an organization have access to the IAM application. However, only users with the `PORTAL_ADMIN` role will be able to edit roles, delete users, and invite new users. `PORTAL_ADMINS` cannot edit their own access or delete themselves from an organzation, that needs to be done by another `PORTAL_ADMIN`. |
There was a problem hiding this comment.
Typo: "organzation" should be "organization".
| All users in an organization have access to the IAM application. However, only users with the `PORTAL_ADMIN` role will be able to edit roles, delete users, and invite new users. `PORTAL_ADMINS` cannot edit their own access or delete themselves from an organzation, that needs to be done by another `PORTAL_ADMIN`. | |
| All users in an organization have access to the IAM application. However, only users with the `PORTAL_ADMIN` role will be able to edit roles, delete users, and invite new users. `PORTAL_ADMINS` cannot edit their own access or delete themselves from an organization, that needs to be done by another `PORTAL_ADMIN`. |
docs/iam/overview.md
Outdated
|
|
||
| ### Access | ||
|
|
||
| All users in an organization have access to the IAM application. However, only users with the `PORTAL_ADMIN` role will be able to edit roles, delete users, and invite new users. `PORTAL_ADMINS` cannot edit their own access or delete themselves from an organzation, that needs to be done by another `PORTAL_ADMIN`. |
There was a problem hiding this comment.
Documentation accuracy: this references PORTAL_ADMINS, but the role listed above (and used elsewhere in the sentence) is PORTAL_ADMIN. To avoid implying a different role constant exists, keep the role name as PORTAL_ADMIN and pluralize outside backticks (e.g., "PORTAL_ADMIN users" / "PORTAL_ADMINs").
| All users in an organization have access to the IAM application. However, only users with the `PORTAL_ADMIN` role will be able to edit roles, delete users, and invite new users. `PORTAL_ADMINS` cannot edit their own access or delete themselves from an organzation, that needs to be done by another `PORTAL_ADMIN`. | |
| All users in an organization have access to the IAM application. However, only users with the `PORTAL_ADMIN` role will be able to edit roles, delete users, and invite new users. PORTAL_ADMIN users cannot edit their own access or delete themselves from an organzation, that needs to be done by another `PORTAL_ADMIN`. |
* Initial plan * Fix spelling: organzation → organization Co-authored-by: acarta99 <160150460+acarta99@users.noreply.github.com> --------- Co-authored-by: copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com> Co-authored-by: acarta99 <160150460+acarta99@users.noreply.github.com>
kirpaChahal
left a comment
There was a problem hiding this comment.
Think this looks great overall. The only additional points I’d suggest including are that invite emails no longer expire after 24 hours, since users are now added to the Botcopy organization immediately once granted access, and that more granular permission roles are planned for a future release.
No description provided.