3.1 Control Plane vs Agent Execution Plane
3.2 Project Scope Model
3.3 Data Flow: Source -> Release -> Pipeline -> Logs/Artifacts
3.4 Runtime Configuration Layers (global / project / environment)
3.5 Pipeline Execution Semantics
3.6 Release Governance Path
3.7 Rollback Architecture (Policy-driven)
3.8 Security and Trust Boundaries
3.9 State and Persistence Model
3.10 Scalability Model
3.11 Failure Modes and Recovery Patterns
3.12 Why This Architecture Works in Practice
16.3 Global Permissions
Orbnetes deployment and release orchestration documentation for operators and platform teams.
Global permissions apply platform-wide and should be limited to trusted administrators.
Typical global privileges:
- super-admin / full platform control,
- global secrets management,
- global variables management,
- system-level config (oauth/notifications/integration settings).
Why separate global from project scope:
- prevents project operators from changing platform-wide security posture,
- preserves blast-radius control,
- simplifies governance and incident ownership.
Best practices:
- keep number of global admins small,
- use dedicated admin accounts where possible,
- enforce stronger security controls (2FA) for global-privileged users.