From ddec061b7ffb4638cb5c3b3c8d2b69d067ba7df9 Mon Sep 17 00:00:00 2001 From: Traci Morrison <52976526+traci-morrison@users.noreply.github.com> Date: Wed, 11 Dec 2019 14:18:31 -0500 Subject: [PATCH] Fix Note format --- ee/ucp/authorization/index.md | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/ee/ucp/authorization/index.md b/ee/ucp/authorization/index.md index b82c4e96ae..29b2a9ce4a 100644 --- a/ee/ucp/authorization/index.md +++ b/ee/ucp/authorization/index.md @@ -90,7 +90,7 @@ together. Only an administrator can manage grants, subjects, roles, and access to resources. -> About administrators +> Note > > An administrator is a user who creates subjects, groups resources by moving them > into collections or namespaces, defines roles by selecting allowable operations, @@ -105,8 +105,10 @@ ClusterRoleBinding can deploy pods with privileged options. This prevents a platform user from being able to bypass the Universal Control Plane Security Model. -> Note: Granting the `cluster admin` ClusterRole to normal users does not allow -> them to deploy privilaged pods. +> Note +> +> Granting the `cluster admin` ClusterRole to normal users does not allow +> them to deploy privileged pods. These privileged options include: