docs: document UI role gating for VIEWER/OPERATOR/ADMIN
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
@@ -250,6 +250,19 @@ Config fields: `metricsEnabled`, `samplingRate`, `tracedProcessors`, `logLevels`
|
||||
| `OPERATOR` | VIEWER + send commands, modify config, replay |
|
||||
| `ADMIN` | OPERATOR + user/group/role management, OIDC config, database admin |
|
||||
|
||||
### UI Role Gating
|
||||
|
||||
The UI enforces role-based visibility (backend ACLs remain the authoritative check):
|
||||
|
||||
| UI element | VIEWER | OPERATOR | ADMIN |
|
||||
|-----------|--------|----------|-------|
|
||||
| Exchanges, Dashboard, Runtime, Logs | Yes | Yes | Yes |
|
||||
| Config tab (per-app) | Read-only | Edit | Edit |
|
||||
| Route control bar | Hidden | Yes | Yes |
|
||||
| Diagram node toolbar | Hidden | Yes | Yes |
|
||||
| Admin sidebar section | Hidden | Hidden | Yes |
|
||||
| Admin pages (`/admin/*`) | Redirect to `/` | Redirect to `/` | Yes |
|
||||
|
||||
### Ed25519 Config Signing
|
||||
|
||||
Server derives an Ed25519 keypair deterministically from the JWT secret. Public key is shared with agents at registration. Config-update payloads are signed so agents can verify authenticity.
|
||||
|
||||
Reference in New Issue
Block a user