You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To grant a user access to a specific namespace in cluster, follow this role/group naming format: <cluster-name>:<role>:<namespace>. The admin must assign this role/group to the user in Keycloak.
Explanation:
This format allows administrators to grant namespace-specific access using predefined roles.
By leveraging roles, administrators can control and limit access to specific resources and operations within a namespace.
Implementation involves creating Role and RoleBinding objects.
Resource Count:
The total number of Roles and RoleBindings in each cluster equals: 4 (roles) × n (namespaces)
Assigning Cluster-Wide Access
To grant a user access to an app namespace in cluster, follow this role/group naming format: <cluster-name>:<role> The admin must assign this role/group to the user in Keycloak.
Explanation:
This format allows administrators to grant access to all namespaces using predefined roles.
By using roles, administrators can enforce specific access restrictions cluster-wide.
Implementation involves creating ClusterRole and ClusterRoleBinding objects.
Resource Count:
The total number of ClusterRoles and ClusterRoleBindings in each cluster equals: 4 (roles)
The text was updated successfully, but these errors were encountered:
I would like to request one change in the developer port-forward role
Here in the role pod/exec is included but genereally we do not give the exec role to developers
I want to assign the port-forward role to one of the developer but It also includes the exec permission
So can we remove pod/exec for the same ? @chintansakhiya@munir131
Roles and Permissions
Each cluster includes four default roles, each defining specific permission rules for users.
1. devops
Permission Rules:
2. developer
Permission Rules:
3. watcher
Permission Rules:
4. developer-portforward
Permission Rules:
Assigning Namespace-Specific Access
To grant a user access to a specific namespace in cluster, follow this role/group naming format:
<cluster-name>:<role>:<namespace>
. The admin must assign this role/group to the user in Keycloak.Explanation:
Resource Count:
The total number of Roles and RoleBindings in each cluster equals:
4 (roles) × n (namespaces)
Assigning Cluster-Wide Access
To grant a user access to an app namespace in cluster, follow this role/group naming format:
<cluster-name>:<role>
The admin must assign this role/group to the user in Keycloak.Explanation:
Resource Count:
The total number of ClusterRoles and ClusterRoleBindings in each cluster equals:
4 (roles)
The text was updated successfully, but these errors were encountered: