-
Notifications
You must be signed in to change notification settings - Fork 166
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Advanced authorization #2668
Changes from 1 commit
34d0377
f2968ad
a265611
86353f8
4c036b6
9eba57a
223c1b2
33bb9c3
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,49 @@ | ||
:_content-type: PROCEDURE | ||
:description: Configuring advanced authorization | ||
:keywords: authorization, user, group | ||
:navtitle: Configuring advanced authorization | ||
// :page-aliases: | ||
|
||
[id="configuring-advanced-authorization"] | ||
= Configuring advanced authorization | ||
|
||
You can determine which users and groups are allowed to access {prod-short}. | ||
|
||
.Prerequisites | ||
|
||
* An active `{orch-cli}` session with administrative permissions to the destination {orch-name} cluster. See {orch-cli-link}. | ||
|
||
.Procedure | ||
|
||
. Configure the `CheCluster` Custom Resource. See xref:using-the-cli-to-configure-the-checluster-custom-resource.adoc[]. | ||
+ | ||
[source,yaml,subs="+quotes,+attributes"] | ||
---- | ||
spec: | ||
networking: | ||
auth: | ||
advancedAuthorization: | ||
allowUsers: | ||
- __<allow_users>__ <1> | ||
allowGroups: | ||
- __<allow_groups>__ <2> | ||
denyUsers: | ||
- __<deny_users>__ <3> | ||
denyGroups: | ||
- __<deny_groups>__ <4> | ||
---- | ||
<1> List of users allowed to access {prod}. | ||
<2> List of groups of users allowed to access {prod} (for {ocp} only). | ||
<3> List of users denied access to {prod}. | ||
<4> List of groups of users denied to access {prod} (for {ocp} only). | ||
+ | ||
Comment on lines
+35
to
+39
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. ok, looks liks on k8s one can only use |
||
To allow a user to access {prod-short}, add him to the `allowUsers` list or a group where he is member of to `allowGroups` list. | ||
Check warning on line 40 in modules/administration-guide/pages/configuring-advanced-authorization.adoc GitHub Actions / vale[vale] modules/administration-guide/pages/configuring-advanced-authorization.adoc#L40
Raw output
|
||
tolusha marked this conversation as resolved.
Show resolved
Hide resolved
|
||
To deny a user to access {prod-short}, add him to the `denyUsers` list or a group where he is member of to `denyGroups` list. | ||
tolusha marked this conversation as resolved.
Show resolved
Hide resolved
|
||
If user is in both `allow` and `deny` lists, then he is denied access to {prod-short}. | ||
tolusha marked this conversation as resolved.
Show resolved
Hide resolved
|
||
+ | ||
If `allowUsers` and `allowGroups` are empty, then all users are allowed to access {prod-short} except ones from `deny` lists. | ||
tolusha marked this conversation as resolved.
Show resolved
Hide resolved
|
||
if `denyUsers` and `denyGroups` are empty, then only users from `allow` lists are allowed to access {prod-short}. | ||
tolusha marked this conversation as resolved.
Show resolved
Hide resolved
|
||
+ | ||
If `allow` and `deny` lists are empty, then all users are allowed to access {prod-short}. | ||
tolusha marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
. Wait for the rollout of the {prod-short} server components to be completed. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@tolusha Should we clarify that this is an OpenShift feature, or this would work on vanilla k8s as well?