-
Notifications
You must be signed in to change notification settings - Fork 508
chore: add docs on restricting PAT creation #1204
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore: add docs on restricting PAT creation #1204
Conversation
|
Mintlify preview ID generated: preview-briane-1761853979-b16de2a |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR documents the new "Organization Viewer" role and PAT (Personal Access Token) creation controls for LangSmith organizations. The changes clarify permission structures and provide guidance on restricting PAT creation.
- Documents new "Organization Viewer" role that cannot create PATs
- Adds documentation for API-based PAT creation controls
- Updates organization permissions table to include the new role
Reviewed Changes
Copilot reviewed 2 out of 2 changed files in this pull request and generated 2 comments.
| File | Description |
|---|---|
| src/langsmith/manage-organization-by-api.mdx | Adds note about Organization Admin permissions requirement and documents API endpoints for disabling/enabling PAT creation organization-wide |
| src/langsmith/administration-overview.mdx | Introduces Organization Viewer role description, updates permissions table to include new role and PAT creation permissions, and removes asterisk footnotes from table entries |
|
|
||
| * `Organization Admin` grants full access to manage all organization configuration, users, billing, and workspaces. **An `Organization Admin` has `Admin` access to all workspaces in an organization** | ||
| * `Organization User` may read organization information but cannot execute any write actions at the organization level. **An `Organization User` can be added to a subset of workspaces and assigned workspace roles as usual (if RBAC is enabled), which specify permissions at the workspace level.** | ||
| * `Organization User` may read organization information but cannot execute any write actions at the organization level. An `Organization User` may create Personal Access Tokens. **An `Organization User` can be added to a subset of workspaces and assigned workspace roles as usual (if RBAC is enabled), which specify permissions at the workspace level.** |
Copilot
AI
Oct 30, 2025
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
[nitpick] The description for Organization User now spans three sentences with varying levels of emphasis (some bold, some not), making it harder to parse. Consider restructuring for consistency with the Organization Admin format: "Organization User may read organization information but cannot execute any write actions at the organization level. An Organization User can be added to a subset of workspaces and assigned workspace roles as usual (if RBAC is enabled), which specify permissions at the workspace level. An Organization User may create Personal Access Tokens."
| * `Organization User` may read organization information but cannot execute any write actions at the organization level. An `Organization User` may create Personal Access Tokens. **An `Organization User` can be added to a subset of workspaces and assigned workspace roles as usual (if RBAC is enabled), which specify permissions at the workspace level.** | |
| * `Organization User` may read organization information but cannot execute any write actions at the organization level. **An `Organization User` can be added to a subset of workspaces and assigned workspace roles as usual (if RBAC is enabled), which specify permissions at the workspace level. An `Organization User` may create Personal Access Tokens.** |
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
Copilot reviewed 2 out of 2 changed files in this pull request and generated no new comments.
|
Mintlify preview ID generated: preview-briane-1761916482-c839573 |
Overview
adds documentation on restricting PAT creation
Organization Viewerrolepat_creation_disabledsettingType of change
Type: Update existing documentation
Related issues/PRs
Checklist
docs devsrc/docs.jsonif neededAdditional notes