3.1 Control Plane vs Agent Execution Plane
3.2 Project Scope Model
3.3 Data Flow: Source -> Release -> Pipeline -> Logs/Artifacts
3.4 Runtime Configuration Layers (global / project / environment)
3.5 Pipeline Execution Semantics
3.6 Release Governance Path
3.7 Rollback Architecture (Policy-driven)
3.8 Security and Trust Boundaries
3.9 State and Persistence Model
3.10 Scalability Model
3.11 Failure Modes and Recovery Patterns
3.12 Why This Architecture Works in Practice
16.5 Access Approval for New OAuth Users
Orbnetes deployment and release orchestration documentation for operators and platform teams.
OAuth login can be integrated with controlled onboarding.
Recommended onboarding model:
- User signs in via GitHub/GitLab OAuth.
- Account is created in pending state.
- Admin reviews and approves access.
- Admin assigns project/global permissions.
- User gains operational access according to assigned scope.
Why this matters:
- prevents automatic unrestricted access from external identity provider,
- enforces explicit onboarding governance,
- ensures each new user is permissioned intentionally.
Operational notes:
- pending users should not execute sensitive actions,
- approval process should include role/permission assignment before activation,
- maintain clear admin workflow for reviewing pending users.