Skip to content

docs: access design + verification guides for multi-org (MSSP) deployments#192

Merged
maximelb merged 5 commits intomasterfrom
docs/verify-user-access
Apr 21, 2026
Merged

docs: access design + verification guides for multi-org (MSSP) deployments#192
maximelb merged 5 commits intomasterfrom
docs/verify-user-access

Conversation

@maximelb
Copy link
Copy Markdown
Contributor

@maximelb maximelb commented Apr 21, 2026

Summary

Adds two documentation pieces, both aimed at administrators standing up new organizations (especially MSSPs / MDRs with their own end customers):

  1. New page 7-administration/access/designing-access.mdDesigning Access for Multi-Org Deployments. Architectural guidance for structuring orgs, Organization Groups, and predefined roles when you have internal staff that spans many tenants and end customers that must stay confined to their own tenant. Covers the recommended architecture (with a diagram), staff-access pattern, end-customer access pattern, prod/non-prod separation, hardening (strict SSO, org API keys, group owner vs. member), a new-customer onboarding checklist, and common anti-patterns.

  2. New section inside 7-administration/access/user-access.mdVerifying and Reviewing Access. Mechanics for confirming exactly who can reach an organization and with which permissions — direct users, Organization Groups, effective per-user permissions, and the audit trail — with both web-UI and limacharlie CLI steps, plus a validation checklist for a production tenant.

The administration index, mkdocs nav, and the top of user-access.md are updated to surface the new design page.

Context

A customer asked two related questions: how to ensure only selected members have access to a newly-created production org (answered by the verification section), and — especially as an MSSP — how to best architect access across their own staff plus their own customers (answered by the new design page).

Existing docs explained the mechanics of granting access and touched on MSSP RBAC conceptually, but did not provide either a verification playbook or an architectural design guide. These additions fill both gaps.

Test plan

  • mkdocs serve renders both pages; Mermaid diagram on the new page displays correctly
  • Nav shows Designing Access under Administration → Access, between User Access and SSO
  • All internal links resolve (user-access.md, api-keys.md, sso.md, permissions.md, infrastructure.md, account-management.md, mssp-msp-mdr.md)
  • CLI commands shown (limacharlie user …, group …, audit list) match current CLI behaviour
  • Admonitions (!!! tip, !!! warning, !!! note) render in the chosen theme

🤖 Generated with Claude Code

maximelb and others added 2 commits April 21, 2026 11:52
Covers reviewing direct users, organization groups, effective
permissions, and audit logs — so administrators can confirm that
only intended members have access to a production tenant.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
…oyments

Explains how to structure organizations, Organization Groups, and
predefined roles when operating many tenants — covering internal staff
access via job-function groups, direct-only access for end-customer
users, prod/non-prod separation, hardening (strict SSO, org API keys,
group owner vs. member), a new-customer onboarding checklist, and
common anti-patterns.

Linked from the administration index, the admin nav, and from the
top of user-access.md for multi-org operators.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@maximelb maximelb changed the title docs: guide for verifying & auditing user access on a new org docs: access design + verification guides for multi-org (MSSP) deployments Apr 21, 2026
maximelb and others added 3 commits April 21, 2026 12:53
- limacharlie auth use → limacharlie auth use-org (the actual
  subcommand; `use` does not exist).
- Drop "tamper-evident" from the audit trail description (LC's
  stream-structures doc explicitly recommends forwarding audit to
  tamper-proof storage, implying the built-in log isn't itself
  tamper-proof); add a pointer to the audit-stream Output option.
- Group workflow: the group CLI takes a raw permission list; there
  is no role-preset flag for groups as there is for direct users.
  Updated the staff-groups table and workflow step 3 to reflect
  this, and documented the correct `group permissions-set --gid …
  --permissions …` form.
- Group create example now includes --name (required flag).
- Onboarding step "transfer ownership" clarified: adding a second
  Owner is self-serve via set-role; billing/legal ownership transfer
  is a separate support request.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
GitHub's Mermaid renderer rejected the quoted subgraph-label form
(subgraph Id["..."]), the cylinder-shaped nodes ([(...)]), and the
labeled dotted arrow (-.label.->) with:
  "Cannot read properties of undefined (reading 'render')"

Switch to the older, more widely-supported syntax:
- subgraph Id [Plain Label]
- plain rectangular nodes
- unlabeled dotted arrows

Also drop parentheses from subgraph labels as belt-and-braces against
stricter Mermaid parsers.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Mermaid's classic parser tokenizes '@' as LINK_ID inside unquoted
bracket labels, which triggers:
  Expecting '...', got 'LINK_ID'

Use plain person names in the end-user nodes instead — the subgraph
label already conveys that these are end-customer users added
directly to their own org.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@maximelb maximelb requested a review from steveatlc April 21, 2026 21:41
@maximelb maximelb marked this pull request as ready for review April 21, 2026 21:41
@maximelb maximelb added the to-code-review Used to tag PRs that are force-pushed and will need to be reviewed after the fact. label Apr 21, 2026
@maximelb maximelb merged commit d9d5a45 into master Apr 21, 2026
2 checks passed
@maximelb maximelb deleted the docs/verify-user-access branch April 21, 2026 21:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

to-code-review Used to tag PRs that are force-pushed and will need to be reviewed after the fact.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant