+
+### HTML tables
+If you have a complex table for which you want to control the cell/column width, and merge cells vertically or horizontally, you can format the entire table in HTML format.
+
+{::nomarkdown}
+
+
+
+
+
+ CLASSIC > NEW |
+
+
+ AVATAR |
+ > |
+ Account Settings |
+ Moved to Settings icon in toolbar |
+
+
+ |
+ |
+ User Management |
+ Moved to Settings icon in toolbar |
+
+
+ |
+ |
+ Billing |
+ Moved to Settings icon in toolbar |
+
+
+ |
+ |
+ User Settings |
+ No change |
+
+
+ |
+ |
+ Git Personal Access Token |
+ New item |
+
+
+
+{:/}
+
+
+## Related articles
+Related articles are sets of links pointing to articles you determine will be most useful for the user to browse or read in the current context.
+
+* Each article is a cross-reference to an article within the same docsite, or very rarely to an external site.
+* Each article is on a separate line, created by adding two spaces or the
tag at the end of the link.
+* If one or more links are conditional to either Enterprise or GitOps Cloud, move them to the end of the set. This is because of a limitation of Jekyll that adds an empty tag.
+
+
+### Example of related articles
+[Configure Product Settings]({{site.baseurl}}/docs/products/configure-product-settings/)
+[Assigning applications to Products]({{site.baseurl}}/docs/products/assign-applications/)
+[Assigning Promotion Flows and triggers to products]({{site.baseurl}}/docs/products/promotion-flow-triggers/)
+[Tracking Product releases]({{site.baseurl}}/docs/promotions/product-releases/)
+
+### Example of related articles with conditions
+
+[Access control for GitOps]({{site.baseurl}}/docs/administration/account-user-management/gitops-abac/)
+{% if page.collection != site.gitops_collection %}
+[Setting up OAuth authentication for Git providers]({{site.baseurl}}/docs/administration/account-user-management/oauth-setup)
+[Access control for pipelines]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/)
+{% endif %}
+
+
+
+
diff --git a/_docs/deployments/helm/helm-environment-promotion.md b/_docs/deployments/helm/helm-environment-promotion.md
index b080acd82..397e96791 100644
--- a/_docs/deployments/helm/helm-environment-promotion.md
+++ b/_docs/deployments/helm/helm-environment-promotion.md
@@ -200,7 +200,7 @@ By default Codefresh will use a built-in install/upgrade pipeline for performing
Note that the variable `CF_HELM_CHART_JSON_GZIP` is both compressed and base64 encoded. To get the raw value you need a command like `echo $CF_HELM_CHART_JSON_GZIP | base64 -d | gunzip`
>**NOTE**
-Only [Codefresh admin users]({{site.baseurl}}/docs/administration/account-user-management/access-control/#users-and-administrators) can override the default pipeline.
+Only [Codefresh admin users]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/#users-and-administrators) can override the default pipeline.
Once you click the *update* button, a new build will run that will perform the deployment.
diff --git a/_docs/deployments/helm/helm-releases-management.md b/_docs/deployments/helm/helm-releases-management.md
index a38e55879..d25749b27 100644
--- a/_docs/deployments/helm/helm-releases-management.md
+++ b/_docs/deployments/helm/helm-releases-management.md
@@ -212,7 +212,7 @@ By default, when you take an action in the UI, Codefresh executes the native Hel
You can override these actions for a specific Helm release by defining custom pipelines for each action. This way you can add your extra logic on top of these actions. For example your own Helm uninstall pipeline might also have a notification step that posts a message to a Slack channel after a release is removed.
>**NOTE**
-Only [Codefresh admin users]({{site.baseurl}}/docs/administration/account-user-management/access-control/#users-and-administrators) can override the default pipelines defined for a Helm release.
+Only [Codefresh admin users]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/#users-and-administrators) can override the default pipelines defined for a Helm release.
1. In the Codefresh UI, from the DevOps Insights section in the sidebar, select [**Helm Releases**](https://g.codefresh.io/helm/releases/releasesNew/){:target="\_blank"}.
1. In the row with the Helm release for which to override default actions, click the **Settings** (gear) icon.
diff --git a/_docs/installation/installation-options/on-premises/on-prem-configuration.md b/_docs/installation/installation-options/on-premises/on-prem-configuration.md
index 2cd06c483..b5bc66256 100644
--- a/_docs/installation/installation-options/on-premises/on-prem-configuration.md
+++ b/_docs/installation/installation-options/on-premises/on-prem-configuration.md
@@ -307,7 +307,7 @@ Settings that are _not_ described in this table are not applicable to on-premise
|**Collaborators** | The number of users permitted for this account. A Collaborator is a Codefresh user who can access the UI. If you keep the count as one, Codefresh displays an error that you have reached the user limit and prevents you from inviting additional users. |
|**Runtime environments** | Optional. The System Runtime Environments to select for this account. The System Runtime Environments are global Runtime Environments predefined by Codefresh. |
|**Codefresh environments** |Optional. For Windows environments, the Codefresh environment to select for the Windows nodes. |
-|**Actions** | The actions available for the account, displayed by clicking the context menu to the right of the account:{::nomarkdown}
- Audit by account: Takes you to the Audit page.
See Auditing actions in Codefresh. - Invite user to account: Opens the popup where you can specify the email of the user to invite to the account. To add the admin role for this user, select Set the user as admin to this account.
- Assign new feature: Displays the list of features where you can enable/disable specific features for this account.
See On-premises feature list. - Show account domains: Restrict user invitations to specific email domains. Clicking Add Domain lets you add the email domains to allow.
See also Define session timeouts and domain restrictions for user accounts. {:/}|
+|**Actions** | The actions available for the account, displayed by clicking the context menu to the right of the account:{::nomarkdown}- Audit by account: Takes you to the Audit page.
See Auditing actions in Codefresh. - Invite user to account: Opens the popup where you can specify the email of the user to invite to the account. To add the admin role for this user, select Set the user as admin to this account.
- Assign new feature: Displays the list of features where you can enable/disable specific features for this account.
See On-premises feature list. - Show account domains: Restrict user invitations to specific email domains. Clicking Add Domain lets you add the email domains to allow.
See also Define session timeouts and domain restrictions for user accounts. {:/}|
diff --git a/_docs/installation/installation-options/on-premises/on-prem-feature-management.md b/_docs/installation/installation-options/on-premises/on-prem-feature-management.md
index 9af7684eb..61fe7678e 100644
--- a/_docs/installation/installation-options/on-premises/on-prem-feature-management.md
+++ b/_docs/installation/installation-options/on-premises/on-prem-feature-management.md
@@ -66,7 +66,7 @@ The table describes in alphabetical order, the features you can open for Codefre
| Feature | Description | Default | Notes |
| -------------- | -------------- | ------- | ------- |
| `appDiffView` |When enabled, and the application is out of sync, displays the differences for each resource in the application in either Compact or Split view modes.
See [Analyze out-of-sync applications with Diff View]({{site.baseurl}}/docs/deployments/gitops/monitor-applications/#analyze-out-of-sync-applications-in-diff-view) | TRUE | |
-| `abacAndRule` | When enabled, supports creating ABAC rules for entities in Codefresh pipelines using "AND".
See [Configuring rules for access control in pipelines]({{site.baseurl}}/docs/administration/account-user-management/access-control/#rules-for-access-control).| FALSE | _Default changed to FALSE in v2.7_ |
+| `abacAndRule` | When enabled, supports creating ABAC rules for entities in Codefresh pipelines using "AND".
See [Configuring rules for access control in pipelines]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/#rules-for-access-control).| FALSE | _Default changed to FALSE in v2.7_ |
|`abacRuntimeEnvironments` | When enabled (the default), allows creating rules in **Permissions** which impacts options in Pipeline > Settings > Build Runtime: {::nomarkdown}- Build Runtime Environment: When enabled, allows restricting Runtime Environments available for pipelines based on tags. Restricted Runtime Environments are disabled in the Runtime Environments list for the pipeline/build run.
- Pipeline actions:
- Manage resources: Select CPU, memory, and minimum disk space for the pipeline/build run.
- Set runtime environment: Select a Runtime Environment from those available in the Runtime Environments list for the pipeline/build run.
- Set cloud builds: Set Cloud build and select the resource size for the pipeline/build run.
{:/}| TRUE | _Default changed to TRUE in v2.5_ |
|`abacHermesTriggers` | When enabled, restricts access to the legacy version of Cron triggers for users without permissions to edit pipelines.| FALSE | |
|`abacUIEnforcement` | When enabled (the default), for Pipelines, prevents the user from selecting options and performing actions which are not permitted.| TRUE | _Default changed to TRUE in v2.5_ |
diff --git a/_docs/integrations/codefresh-api.md b/_docs/integrations/codefresh-api.md
index 55d43d453..4971633f7 100644
--- a/_docs/integrations/codefresh-api.md
+++ b/_docs/integrations/codefresh-api.md
@@ -83,10 +83,10 @@ The following resources can be targeted with the API:
* *Agent* - Used for [Codefresh Runner installation]({{site.baseurl}}/docs/installation/behind-the-firewall/)
* *Audit* - Read [Audit logs]({{site.baseurl}}/docs/administration/account-user-management/audit/)
* *Build* - Get/change [build status]({{site.baseurl}}/docs/pipelines/monitoring-pipelines/)
-* *Cluster* - [Access control]({{site.baseurl}}/docs/administration/account-user-management/access-control/) for [Kubernetes clusters]({{site.baseurl}}/docs/deployments/kubernetes/manage-kubernetes/)
+* *Cluster* - [Access control]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/) for [Kubernetes clusters]({{site.baseurl}}/docs/deployments/kubernetes/manage-kubernetes/)
* *Environments-v2* - Read/Write [Environment Dashboard]({{site.baseurl}}/docs/deployments/kubernetes/environment-dashboard/) information
* *GitHub Actions* - Run [GitHub Actions inside Codefresh pipelines]({{site.baseurl}}/docs/integrations/github-actions/)
-* *Pipeline* - [Access control]({{site.baseurl}}/docs/administration/account-user-management/access-control/) for [pipelines]({{site.baseurl}}/docs/pipelines/introduction-to-codefresh-pipelines/)
+* *Pipeline* - [Access control]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/) for [pipelines]({{site.baseurl}}/docs/pipelines/introduction-to-codefresh-pipelines/)
* *Repos* - Refers to [Git repositories]({{site.baseurl}}/docs/integrations/git-providers/)
* *Step Type* - Refers to [custom pipeline steps]({{site.baseurl}}/docs/pipelines/steps/#creating-a-typed-codefresh-plugin)
@@ -292,7 +292,7 @@ Codefresh automatically generates additional fields, usually fields with dates a
| `project` | `metadata` | string | the project that contains this pipeline |
| `originalYamlString` | `metadata` | string | the full contents of the pipeline editor. Only kept for archival purposes |
| `labels` | `metadata` | object | Holds the `tags` array |
-| `tags` | `labels` | array | A list of [access control tags]({{site.baseurl}}/docs/administration/account-user-management/access-control/#marking-pipelines-with-policy-attributes) for this pipeline |
+| `tags` | `labels` | array | A list of [access control tags]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/#marking-pipelines-with-policy-attributes) for this pipeline |
| `description` | `metadata` | string | Human readable description of the pipeline |
| `isPublic ` | `metadata` | boolean | If true, the pipeline logs [will be public]({{site.baseurl}}/docs/pipelines/configuration/build-status/) even for non-authenticated users |
| `template ` | `metadata` | boolean | If true, this pipeline will be listed as a template when creating a new pipeline |
diff --git a/_docs/integrations/git-providers.md b/_docs/integrations/git-providers.md
index f8431d51b..91e931120 100644
--- a/_docs/integrations/git-providers.md
+++ b/_docs/integrations/git-providers.md
@@ -131,7 +131,7 @@ caption="GitHub permissions"
alt="GitHub permissions"
%}
-For GitHub on-premises you also need to provide the URL of the GitHub server in your organization. If enabled in your account you can setup [Pipeline definition restrictions]({{site.baseurl}}/docs/administration/account-user-management/access-control/#pipeline-definition-restrictions) by expanding the *YAML Options* segment.
+For GitHub on-premises you also need to provide the URL of the GitHub server in your organization. If enabled in your account you can setup [Pipeline definition restrictions]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/#pipeline-definition-restrictions) by expanding the *YAML Options* segment.
### Using External Secrets for GitHub Token
@@ -204,7 +204,7 @@ If you need additional permission for your integration, use the Manual Creation
1. To apply your changes, click **Save**.
>**NOTE**
-If enabled in your account you can set up [Pipeline definition restrictions]({{site.baseurl}}/docs/administration/account-user-management/access-control/#pipeline-definition-restrictions) by expanding the *YAML Options* segment.
+If enabled in your account you can set up [Pipeline definition restrictions]({{site.baseurl}}/docs/administration/account-user-management/-pipelines/#pipeline-definition-restrictions) by expanding the *YAML Options* segment.
## GitLab
@@ -225,7 +225,7 @@ The name you enter in order to create the token in the GitLab UI is completely a
Once you have the token, paste it in the Codefresh UI and click *Test connection*. If everything is OK can
now save the Git integration.
-For GitLab on-premises, you also need to provide the URL of the GitLab server in your organization. If enabled in your account you can set up [Pipeline definition restrictions]({{site.baseurl}}/docs/administration/account-user-management/access-control/#pipeline-definition-restrictions) by expanding the *YAML Options* segment.
+For GitLab on-premises, you also need to provide the URL of the GitLab server in your organization. If enabled in your account you can set up [Pipeline definition restrictions]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/#pipeline-definition-restrictions) by expanding the *YAML Options* segment.
### Using External Secrets for GitLab Token
@@ -330,7 +330,7 @@ alt="Codefresh integration with Azure Devops"
Your Azure DevOps repositories will be available when [creating a new project in Codefresh]({{site.baseurl}}/docs/quick-start/ci-quick-start/create-ci-pipeline/).
- If enabled in your account you can setup [Pipeline definition restrictions]({{site.baseurl}}/docs/administration/account-user-management/access-control/#pipeline-definition-restrictions) by expanding the *YAML Options* segment.
+ If enabled in your account you can setup [Pipeline definition restrictions]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/#pipeline-definition-restrictions) by expanding the *YAML Options* segment.
## Atlassian Stash
diff --git a/_docs/integrations/helm.md b/_docs/integrations/helm.md
index ec71b09e3..49f8627ff 100644
--- a/_docs/integrations/helm.md
+++ b/_docs/integrations/helm.md
@@ -18,7 +18,7 @@ Native support for Helm in Codefresh includes:
The built-in Helm repository is production ready. You can start using Helm right away with your Codefresh account,
even if you don't have an external Helm repository. See our [quick start guide for Helm]({{site.baseurl}}/docs/quick-start/ci-quick-start/deploy-with-helm/) or the [complete Helm example]({{site.baseurl}}/docs/example-catalog/cd-examples/helm/).
-For each Helm integration, you can toggle the level of access for [non-admin users]({{site.baseurl}}/docs/administration/account-user-management/access-control/#users-and-administrators).
+For each Helm integration, you can toggle the level of access for [non-admin users]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/#users-and-administrators).
{{site.data.callout.callout_warning}}
**IMPORTANT**
diff --git a/_docs/kb/articles/automating-shared-secrets-creation.md b/_docs/kb/articles/automating-shared-secrets-creation.md
index 3309619ac..70926ecbb 100644
--- a/_docs/kb/articles/automating-shared-secrets-creation.md
+++ b/_docs/kb/articles/automating-shared-secrets-creation.md
@@ -58,5 +58,5 @@ echo "$CMD"
## Related articles
[Secrets in pipelines]({{site.baseurl}}/docs/pipelines/configuration/secrets-store/)
-[Configuring access control for pipelines]({{site.baseurl}}/docs/administration/account-user-management/access-control/)
+[Access control for pipelines]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/)
[Pipeline execution context]({{site.baseurl}}/docs/administration/account-user-management/pipeline-execution-context/)
diff --git a/_docs/pipelines/configuration/shared-configuration.md b/_docs/pipelines/configuration/shared-configuration.md
index 0123d99ca..d6087ab06 100644
--- a/_docs/pipelines/configuration/shared-configuration.md
+++ b/_docs/pipelines/configuration/shared-configuration.md
@@ -76,7 +76,7 @@ If you didn't include a resource name during secret creation then enter the full
### Level of access
-For each set of values you can toggle the level of access by [non-admin users]({{site.baseurl}}/docs/administration/access-control/#users-and-administrators). If it is off, users will **not** be able to use the [CLI](https://codefresh-io.github.io/cli/) or [API]({{site.baseurl}}/docs/integrations/codefresh-api/)
+For each set of values you can toggle the level of access by [non-admin users]({{site.baseurl}}/docs/administration/access-control-pipelines/#users-and-administrators). If it is off, users will **not** be able to use the [CLI](https://codefresh-io.github.io/cli/) or [API]({{site.baseurl}}/docs/integrations/codefresh-api/)
to access these [values](https://codefresh-io.github.io/cli/contexts/). If it is on, all users from all your Codefresh teams will be able to access this set of values
with CLI commands or API calls.
diff --git a/_docs/pipelines/pipelines.md b/_docs/pipelines/pipelines.md
index 8c0b15848..fb8079692 100644
--- a/_docs/pipelines/pipelines.md
+++ b/_docs/pipelines/pipelines.md
@@ -55,7 +55,7 @@ Of course, you can also have a simpler scenario where the trigger, the pipeline
## Creating a pipeline
-You can create new projects by clicking on *Projects* in the left sidebar and then selecting the *New Project* button on the top right corner. A dialog will appear that will ask you for the project name and optional tags that you can use for [access control]({{site.baseurl}}/docs/administration/account-user-management/access-control/).
+You can create new projects by clicking on *Projects* in the left sidebar and then selecting the *New Project* button on the top right corner. A dialog will appear that will ask you for the project name and optional tags that you can use for [access control]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/).
>**NOTE**
@@ -206,7 +206,7 @@ Once you create your pipeline you can also click on the top tab called *Settings
{{site.data.callout.end}}
- **Pipeline Description**: Free text description of the pipeline.
-- **Pipeline Tags**: One or more tags used for [access control]({{site.baseurl}}/docs/administration/account-user-management/access-control/)
+- **Pipeline Tags**: One or more tags used for [access control]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/)
- **Public Build Logs**: If enabled, [users without a Codefresh account]({{site.baseurl}}/docs/pipelines/configuration/build-status/#public-build-logs) can view the builds of this pipeline.
- **Template**: Convert this pipeline to a template (see the next section for details on templates).
- **Badges**: Simple images that show you the last [build status]({{site.baseurl}}/docs/pipelines/configuration/build-status/).
@@ -267,7 +267,7 @@ Codefresh authenticates the credentials of each cluster during the build initial
The option to select clusters for a pipeline is available only when the account-level pipeline setting is enabled. See [Enabling cluster contexts for pipelines]({{site.baseurl}}/docs/pipelines/configuration/pipeline-settings/#enabling-cluster-contexts-for-pipelines).
* **Update Cluster** permission for users in the Codefresh UI through [Permissions](https://g.codefresh.io/account-admin/permissions/teams){:target="\_blank"}.
- For more information, see [Access Control]({{site.baseurl}}/docs/administration/account-user-management/access-control/#access-to-kubernetes-clusters-and-pipelines).
+ For more information, see [Access Control]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/#access-to-kubernetes-clusters-and-pipelines).
As part of the Pipeline > Policies, you can either allow access to all clusters (the default), or only specific clusters as in the example below.
diff --git a/_docs/pipelines/steps/approval.md b/_docs/pipelines/steps/approval.md
index 40770da2f..5e1db748e 100644
--- a/_docs/pipelines/steps/approval.md
+++ b/_docs/pipelines/steps/approval.md
@@ -103,7 +103,7 @@ the approval step will be automatically rejected.
## Approval Restrictions
By default, any Codefresh user can approve any pipeline that is paused at the approval state. If you want to restrict
-the approval action to a subset of people, you can use the [access control capabilities]({{site.baseurl}}/docs/administration/account-user-management/access-control/) that Codefresh provides.
+the approval action to a subset of people, you can use the [access control capabilities]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/) that Codefresh provides.
This is a two-step process. First you need to tag your pipeline with one or more tags (tag names are arbitrary). You can edit tags in the pipeline settings screen.
diff --git a/_docs/whats-new/on-prem-release-notes.md b/_docs/whats-new/on-prem-release-notes.md
index d037c2757..6185081fc 100644
--- a/_docs/whats-new/on-prem-release-notes.md
+++ b/_docs/whats-new/on-prem-release-notes.md
@@ -615,7 +615,7 @@ caption="Rules for runtime environments and resources in pipelines"
max-width="60%"
%}
-For details, see [Assign tags to Pipeline Runtimes]({{site.baseurl}}/docs/administration/account-user-management/access-control/#assign-tags-to-pipeline-runtimes) and [Creating rules for Pipeline Runtimes and runtime environments]({{site.baseurl}}/docs/administration/account-user-management/access-control/#creating-rules-for-pipeline-runtimes-and-runtime-environments).
+For details, see [Assign tags to Pipeline Runtimes]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/#assign-tags-to-pipeline-runtimes) and [Creating rules for Pipeline Runtimes and runtime environments]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/#creating-rules-for-pipeline-runtimes-and-runtime-environments).
#### Pipelines: Dedicated environment variables for pull request titles
@@ -1456,7 +1456,7 @@ caption="Rules with OR/AND logic for tags"
max-width="40%"
%}
-For details, see [ABAC for entities with tags and rules]({{site.baseurl}}/docs/administration/account-user-management/access-control/#abac-for-entities-with-tags-and-rules).
+For details, see [ABAC for entities with tags and rules]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/#abac-for-entities-with-tags-and-rules).
diff --git a/_gitops/administration/account-user-management/access-control-user-accounts.md b/_gitops/administration/account-user-management/access-control-user-accounts.md
new file mode 120000
index 000000000..c5ca817a5
--- /dev/null
+++ b/_gitops/administration/account-user-management/access-control-user-accounts.md
@@ -0,0 +1 @@
+../../../_docs/administration/account-user-management/access-control-user-accounts.md
\ No newline at end of file
diff --git a/_gitops/administration/account-user-management/add-users-teams.md b/_gitops/administration/account-user-management/add-users-teams.md
new file mode 120000
index 000000000..b8ac5618a
--- /dev/null
+++ b/_gitops/administration/account-user-management/add-users-teams.md
@@ -0,0 +1 @@
+../../../_docs/administration/account-user-management/add-users-teams.md
\ No newline at end of file
diff --git a/_gitops/administration/account-user-management/add-users.md b/_gitops/administration/account-user-management/add-users.md
deleted file mode 120000
index f0145733b..000000000
--- a/_gitops/administration/account-user-management/add-users.md
+++ /dev/null
@@ -1 +0,0 @@
-../../../_docs/administration/account-user-management/add-users.md
\ No newline at end of file
diff --git a/_posts/2024-07-29-july-release-notes.md b/_posts/2024-07-29-july-release-notes.md
index fdea33e6e..6550d5526 100644
--- a/_posts/2024-07-29-july-release-notes.md
+++ b/_posts/2024-07-29-july-release-notes.md
@@ -42,7 +42,7 @@ caption="Rules for runtime environments and resources in pipelines"
max-width="60%"
%}
-For details, see [Assign tags to Pipeline Runtimes]({{site.baseurl}}/docs/administration/account-user-management/access-control/#assign-tags-to-pipeline-runtimes) and [Creating rules for Pipeline Runtimes and runtime environments]({{site.baseurl}}/docs/administration/account-user-management/access-control/#creating-rules-for-pipeline-runtimes-and-runtime-environments).
+For details, see [Assign tags to Pipeline Runtimes]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/#assign-tags-to-pipeline-runtimes) and [Creating rules for Pipeline Runtimes and runtime environments]({{site.baseurl}}/docs/administration/account-user-management/access-control-pipelines/#creating-rules-for-pipeline-runtimes-and-runtime-environments).
### GitOps: Runtime upgrade
diff --git a/assets/js/src/argohub-redirect-mapping.json b/assets/js/src/argohub-redirect-mapping.json
index 482c85d7a..bd39e04c0 100644
--- a/assets/js/src/argohub-redirect-mapping.json
+++ b/assets/js/src/argohub-redirect-mapping.json
@@ -3,7 +3,7 @@
"/docs/installation/gitops/shared-configuration/": "/gitops/gitops-runtimes/shared-configuration/",
"/docs/security/git-tokens/": "/gitops/security/git-tokens/",
"/docs/security/secrets/": "/gitops/security/secrets/",
- "/docs/administration/account-user-management/add-users/": "/gitops/administration/account-user-management/add-users/",
+ "/docs/administration/account-user-management/add-users-teams/": "/gitops/administration/account-user-management/add-users-teams/",
"/docs/administration/account-user-management/create-codefresh-account/": "/gitops/administration/account-user-management/create-codefresh-account/",
"/docs/administration/account-user-management/gitops-abac/": "/gitops/administration/account-user-management/gitops-abac/",
"/docs/administration/account-user-management/hosted-authorize-orgs/": "/gitops/administration/account-user-management/hosted-authorize-orgs/",
@@ -118,5 +118,6 @@
"/docs/installation/gitops/runtime-install-ingress-service-mesh-access-mode/": "/gitops/gitops-runtimes/runtime-install-ingress-service-mesh-access-mode/",
"/docs/promotions/getting-started/": "/gitops/promotions/getting-started/",
"/docs/installation/gitops/runtime-troubleshooting/": "/gitops/gitops-runtimes/runtime-troubleshooting/",
- "/docs/products/promotion-concurrency/": "/gitops/products/promotion-concurrency/"
+ "/docs/products/promotion-concurrency/": "/gitops/products/promotion-concurrency/",
+ "/docs/administration/account-user-management/access-control-user-accounts/": "/gitops/administration/account-user-management/access-control-user-accounts/"
}
diff --git a/images/administration/access-control/pat.png b/images/administration/access-control/pat.png
deleted file mode 100644
index 17a9baf94..000000000
Binary files a/images/administration/access-control/pat.png and /dev/null differ
diff --git a/images/administration/access-control/security-timeout.png b/images/administration/access-control/security-timeout.png
index eb4bc977a..de027658c 100644
Binary files a/images/administration/access-control/security-timeout.png and b/images/administration/access-control/security-timeout.png differ
diff --git a/images/administration/access-control/teams.png b/images/administration/access-control/teams.png
deleted file mode 100644
index 58f7c2c85..000000000
Binary files a/images/administration/access-control/teams.png and /dev/null differ
diff --git a/images/administration/access-control/user-access-control.png b/images/administration/access-control/user-access-control.png
deleted file mode 100644
index 954101752..000000000
Binary files a/images/administration/access-control/user-access-control.png and /dev/null differ