You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/cloud/security/roles/_index.md
+32Lines changed: 32 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -213,4 +213,36 @@ Team owners carry the team administrator role, and may be joined in their team a
213
213
The entitlement of "team owner" is automatically bestowed to the creator of a team. The individual user who created a given team initially is therefore granted certain administrative privileges beyond that of other team administrators. Specifically, team owners retain the sole permission to delete the team.
214
214
215
215
For more information, see [Teams](/cloud/identity/teams).
216
+
{{< /alert >}}
217
+
218
+
## Example: The Orbital Labs Role Hierarchy
219
+
220
+
The following illustrates how Provider Admin, Org Admin, and Team Admin roles stack in practice across the Orbital Labs ecosystem. See [Meet Five and the Cast](/cloud/about) for the full narrative.
221
+
222
+
<imgsrc="/images/five/layer5-five-mascot-means-business.svg"alt="Five means business"style="width:90px; float:right; margin-left:1.5rem; margin-bottom:1rem;" />
**Scope:** All tenants (Orbital Labs, Stellar Dynamics, and others)
228
+
229
+
Dr. Aiko Sato holds the Provider Admin role at Constellation Cloud, the MSP that manages Orbital Labs as a tenant. Provider Admins can perform CRUD on all resources across all tenant organizations. Dr. Sato has seen every misconfigured RBAC policy known to humankind, which is why she documents each one.
Maya Chen holds the Org Admin role for Orbital Labs. She manages user accounts, team membership, workspace creation, and role assignments within Orbital Labs. She also serves as Team Admin for the Development team — an Org Admin may administer any team in their organization.
236
+
{{% /card %}}
237
+
{{% card header="**Zara Osei** — Team Administrator" %}}
238
+
**Organization:** Orbital Labs
239
+
**Team:** Infrastructure
240
+
**Scope:** Infrastructure team members and their workspace access
241
+
242
+
Zara Osei holds the Team Admin role for Orbital Labs' Infrastructure team. She manages keychain assignments for Five and controls which environments the Infrastructure team can access. Access requests go through Zara's 48-hour SLA — no exceptions, no matter how urgent Five thinks the situation is.
243
+
{{% /card %}}
244
+
{{< /cardpane >}}
245
+
246
+
{{< alert type="info" >}}
247
+
Role assignments are org-scoped. Dr. Aiko's Provider Admin role spans all tenants; Maya's Org Admin role applies only within Orbital Labs; Zara's Team Admin role applies only to the Infrastructure team within Orbital Labs.
Copy file name to clipboardExpand all lines: content/en/cloud/spaces/environments.md
+47Lines changed: 47 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,3 +42,50 @@ Connections are an integral part of Environment. These are cloud native resource
42
42
Credentials in an Environment are the keys to securely authenticate and access managed connections. For example, valid Prometheus secrets or Kubernetes API tokens are essential credentials for securely interacting with these managed resources.
43
43
44
44
> See "[Credentials](https://docs.meshery.io/concepts/logical/credentials)" in Meshery Docs for more information.
45
+
46
+
## Example: Orbital Labs Environment Setup
47
+
48
+
The following illustrates how Five and Zara set up multi-cloud environments at Orbital Labs, spanning AWS, GCP, and Azure. See [Meet Five and the Cast](/cloud/about) for the full seed inventory.
|`stellar-enterprise`| stellar-main | Azure | AKS, Azure SQL, Azure API Management, Azure AD |
60
+
61
+
### Connecting prod-aws
62
+
63
+
Five connects Orbital Labs' primary AWS production environment to Layer5 Cloud:
64
+
65
+
1. Navigate to **Environments** and click **Create Environment**
66
+
2. Name it `prod-aws` and save
67
+
3. Add connections one at a time — each connection is a discrete cloud resource:
68
+
-**EKS cluster** — the compute layer for deployed workloads
69
+
-**RDS (PostgreSQL)** — the managed database instance
70
+
-**S3 bucket** — object storage for design artifacts and state
71
+
-**CloudFront distribution** — CDN layer for the frontend
72
+
-**SQS queue** — async messaging between services
73
+
4. Zara assigns `prod-aws` to the `orbital-production` workspace, making all five connections available to Infrastructure team members
74
+
75
+
### Adding prod-gcp for Multi-Cloud Coverage
76
+
77
+
Five repeats the process for GCP to give Orbital Labs multi-cloud flexibility:
78
+
79
+
1. Create environment `prod-gcp`
80
+
2. Add connections:
81
+
-**GKE cluster** — Google Kubernetes Engine compute
82
+
-**Cloud SQL** — managed relational database on GCP
83
+
-**Cloud Storage bucket** — GCP object storage
84
+
-**Pub/Sub topic** — async messaging on GCP
85
+
3. Zara assigns `prod-gcp` to `orbital-production` alongside `prod-aws`
86
+
87
+
Both environments are now available to any design deployed within the `orbital-production` workspace.
88
+
89
+
{{< alert type="info" title="dev-local for Getting Started" >}}
90
+
The `dev-local` environment uses a local Kubernetes cluster (kind) and LocalStack to emulate AWS services — no cloud credentials required. If you are following along with these docs for the first time, start with `dev-local` in the `orbital-dev` workspace.
Copy file name to clipboardExpand all lines: content/en/cloud/spaces/workspaces.md
+30Lines changed: 30 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,3 +84,33 @@ Workspaces enhance collaboration within your teams, providing a structured envir
84
84
{{< alert type="info" title="Looking for Practical Workspace Management?" >}}
85
85
For a step-by-step guide on how to create, edit, and manage your workspaces, see the [Managing Workspaces](/cloud/spaces/managing-workspaces/) documentation.
86
86
{{< /alert >}}
87
+
88
+
## Example: Orbital Labs Workspace Setup
89
+
90
+
The following illustrates how Five and Maya set up workspaces at Orbital Labs to segment access across infrastructure and development workflows. See [Meet Five and the Cast](/cloud/about) for the full seed inventory.
91
+
92
+
### Workspace Inventory
93
+
94
+
| Workspace | Owner Org | Teams with Access | Environments |
|`orbital-staging`| Orbital Labs | Infrastructure + Development |`staging-aws` (EKS + S3 + ElastiCache), `staging-azure` (AKS + Azure Blob + Azure Service Bus) |
98
+
|`orbital-dev`| Orbital Labs | Development only |`dev-local` (kind + LocalStack) |
99
+
100
+
### Creating orbital-staging
101
+
102
+
Five creates the `orbital-staging` workspace to give the Development team a shared environment for feature-branch testing — without handing them the keys to production.
103
+
104
+
**Steps Five follows:**
105
+
1. Navigate to **Workspaces** and click **Create Workspace**
106
+
2. Name the workspace `orbital-staging`
107
+
3. Save — the workspace is created with no team access and no environments assigned
108
+
109
+
**Maya then assigns team access:**
110
+
1. Open the `orbital-staging` workspace settings
111
+
2. Add the **Infrastructure** team — enabling Zara and Five to manage environment connections
112
+
3. Add the **Development** team — enabling Rex and Jordan to deploy designs and use connections
113
+
114
+
{{< alert type="info" title="Why both teams?" >}}
115
+
Infrastructure owns the environments (Zara assigns connections); Development owns the designs (Rex and Jordan deploy them). Assigning both teams to `orbital-staging` gives each group the access it needs without elevating Development's access to `orbital-production`.
0 commit comments