Manage Operations Center roles¶
You can create new roles and give or remove authorization to all users assigned to a specific role. This includes allowing users to create and modify roles and authentication settings, allowing them API access, and allowing users to use SSH to log into the servers of this cluster.
To get to the Operations Center roles menu, from any page of the Operations Center open the Settings menu by clicking the icon next to your username, then from the drop-down menu that appears, select Settings.
Then from the left navigation menu, click the Roles link.
You will now see a list of roles, and a resource file for each role that defines the role.
Resource files¶
The resource file controls:
- Which resources and clusters the role can access.
- Whether the access is to
readorwritesettings or both. - Whether the role is mapped to a Kubernetes user group. EXAMPLE: The
adminprivileged group. - What Kubernetes namespaces the role has access to. EXAMPLE: Access to the
defaultnamespace enables seeing most cluster deployments and pods. - Whether the role has access to SSH into the servers of this cluster.
- Which user IDs the role can authenticate as if the role does have access to
SSH into the servers of this cluster. EXAMPLE:
rootis the default for admins.
Create or edit Operations Center roles¶
To add a new role, click the New Role button. This shows a blank resource configuration.
To edit an existing role, click the name of a role in the list. This shows the resource configuration that defines the role.
Below is an example of a resource configuration with the definition of an admin
role. The admin has read and write access to all resources, including
roles, other users, and authentication settings such as OIDC connectors. The
admin also belongs to a privileged Kubernetes group.
kind: role
version: v2
metadata:
name: administrator
spec:
resources:
"*":
- read
- write
clusters:
- "*"
generate_licenses: true
kubernetes_groups:
- admin
logins:
- root
max_session_ttl: "30h0m0s"
namespaces:
- "*"
repositories:
- "*"
Below is an example of a non-admin role spec providing access to a particular
cluster example.com and its applications:
kind: role
version: v2
metadata:
name: developer
spec:
resources:
cluster:
- read
- write
app:
- read
- write
clusters:
- example.com
kubernetes_groups:
- admin
logins:
- root
max_session_ttl: "10h0m0s"
namespaces:
- default
repositories:
- "*"
After completing the resource configuration, click the Save button to save and return to the list of roles.
Deleting roles¶
Click the name of a role in the list and click the Delete button.