diff options
author | Vincent Cojot <vcojot@redhat.com> | 2017-04-19 01:46:39 +0530 |
---|---|---|
committer | Vincent Cojot <vcojot@redhat.com> | 2017-04-19 01:46:39 +0530 |
commit | 2c5926c9d1f80d2fc022c6fa21cfdb1bfafe161d (patch) | |
tree | 55d3e0b53b4a89073e270f0103a9cb3366071445 | |
parent | 17adfb65b6c823b3c1d7faa751e4799d35bd734c (diff) | |
download | openstack-access-policy-2c5926c9d1f80d2fc022c6fa21cfdb1bfafe161d.tar.gz openstack-access-policy-2c5926c9d1f80d2fc022c6fa21cfdb1bfafe161d.tar.xz openstack-access-policy-2c5926c9d1f80d2fc022c6fa21cfdb1bfafe161d.zip |
Update README.md
-rw-r--r-- | README.md | 8 |
1 files changed, 5 insertions, 3 deletions
@@ -24,8 +24,10 @@ On the undercloud, as the 'stack' user perform the following steps: (this will auto-detect the controllers and push the appropriate policies) -To restrict a user, then simply do add the 'readonly' role to the user, do a: - openstack role add --project <tenant_name> --user <user_name> readonly +To restrict a user, then simply do add the 'readonly' role to the user, do a: + + openstack role add --project <tenant_name> --user <user_name> readonly To lift the restrictions and re-enable modifications to the overcloud, do a: - openstack role remove --project <tenant_name> --user <user_name> readonly + + openstack role remove --project <tenant_name> --user <user_name> readonly |