diff options
author | Vincent Cojot <vcojot@redhat.com> | 2017-04-19 01:45:20 +0530 |
---|---|---|
committer | Vincent Cojot <vcojot@redhat.com> | 2017-04-19 01:45:20 +0530 |
commit | 63eb72dd41fd1fe89f75111b1b9359eed46d941b (patch) | |
tree | b92ba934e84e3bbfe916fef0837401dda3ef0e11 | |
parent | c172bb5a150db7bb069b04eeb68f8e84009aeea5 (diff) | |
download | openstack-access-policy-63eb72dd41fd1fe89f75111b1b9359eed46d941b.tar.gz openstack-access-policy-63eb72dd41fd1fe89f75111b1b9359eed46d941b.tar.xz openstack-access-policy-63eb72dd41fd1fe89f75111b1b9359eed46d941b.zip |
Update README.md
-rw-r--r-- | README.md | 10 |
1 files changed, 5 insertions, 5 deletions
@@ -22,10 +22,10 @@ On the undercloud, as the 'stack' user perform the following steps: 2) git clone https://gitlab.cee.redhat.com/vcojot/OSP-Readonly-Policies/tree/master 3) ./policydir/files/push_readonly_policies_to_overcloud.sh -(this will auto-detect the controllers and push the appropriate policies) +(this will auto-detect the controllers and push the appropriate policies) -To restrict a user, then simply do add the 'readonly' role to the user, do a: -openstack role add --project <tenant_name> --user <user_name> readonly +To restrict a user, then simply do add the 'readonly' role to the user, do a: +openstack role add --project <tenant_name> --user <user_name> readonly -To lift the restrictions and re-enable modifications to the overcloud, do a: -openstack role remove --project <tenant_name> --user <user_name> readonly +To lift the restrictions and re-enable modifications to the overcloud, do a: +'''openstack role remove --project <tenant_name> --user <user_name> readonly''' |