From 2bdb0a1fe141dc2c13561ed601251b998c4b9d8f Mon Sep 17 00:00:00 2001 From: Brandon Hopkins <76761586+TechHutTV@users.noreply.github.com> Date: Fri, 28 Nov 2025 07:24:33 -0800 Subject: [PATCH] Enhance resource access management documentation (#499) Updated the section on managing access to resources to clarify the assignment of resources to groups and the creation of access control policies. Added details on how peers access resources based on group policies and included a note about resources not being part of the built-in 'All' group by default. --- src/pages/manage/networks/index.mdx | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/src/pages/manage/networks/index.mdx b/src/pages/manage/networks/index.mdx index 39e8f5a9..f86141f5 100644 --- a/src/pages/manage/networks/index.mdx +++ b/src/pages/manage/networks/index.mdx @@ -104,7 +104,8 @@ On a technical level the feature works as follows: ## Manage access to resources -To manage access to resources, you can assign them to groups and create [access control policies](/manage/access-control/manage-network-access#creating-policies) to define which peers can access them. +To manage access to resources, you should assign them to groups and create [access control policies](/manage/access-control/manage-network-access#creating-policies) to grant access from the specific peer groups. A peer will "see" the resource only after a policy allows access from one of peer's (source) groups to one of the resource's (destination) groups. + See the image below with an example resource `CRM`:

resource-group @@ -113,6 +114,11 @@ See the image below with an example resource `CRM`: Access control policies are rules that define which peers can access the resources in your network. You can create policies based on the source and destination groups, and the type of traffic allowed (e.g., TCP, UDP, ICMP). The groups assigned to resources should always be placed in the destination input field of the policy. The peers belonging to the source groups will receive the resources linked to the policy and the firewall rules will be applied according to what is defined. + + + Unlike peers, resources are not members of the built-in `All` group by default. If you want to utilize `All` group rules with resources, you must explicitly add them to this group. + + See the example below with a policy that allows the group `Berlin Office` to access the internal CRM system: