Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The following sections outline the basic steps and provide examples on how to configure various components of RBAC.

To review general concepts, see Role-Based Access Control (RBAC).

Enable RBAC

To enable RBAC, add the following code to the <custom_values.yaml> file:

...

Line #

...

Code

...

Description

...

3

...

RBACEnabled: true

The default RBAC policy is a fully-enabled RBAC, with full access.

To

...

4

...

rbacDefaultUserRole: Editor

enable RBAC, add the following code to the <custom_values.yaml> file:

RBACEnabled: true

Default User Role

The default user role for new users in

...

Kloudfuse is Editor.

rbacDefaultUserRole: Editor

Admins can change this setting in the UI for individual users.

...

See Assign Roles.

To change the default assignment for new users to Viewer, use rbacDefaultUserRole: Viewer in the values.yaml file instead.

Code Block
global:
  ...
  RBACEnabled: true
  rbacDefaultUserRole: Editor

Policy Configuration

Note

Starting with Release 2.7.2, KloudFuse DOES NOT SUPPORT policy configuration at script level.
Use the Policy Management in the Kloud Fuse Admin tab, as we describe in Policy Configuration Management.

Use following template, make changes in the <custom_values.yaml>

...

Default Policy

2.7.3.svgImage Added Users who do not have a Policy assigned through the UI get a default level of access, depending on their Role:

  • Admins
    default_rbac_policy:

...

  • rbac_allow_all

...

Change default policy

Note

Starting with Release 2.7.2, KloudFuse DOES NOT SUPPORT policy configuration at script level.
Use the Policy Management in the Kloud Fuse Admin tab, as we describe in Policy Configuration Management.

When RBAC is enabled, default policy allows full access. Add following to your <custom_values.yaml> to use your custom policy or remove the default policy of full access to no access.

Example: Default policy to disallow all capabilities

Note: Using “scope_allow_none” as the default policy will ensure that logged in user doesn’t have any capabilities (view data or take actions) in the system. It doesn’t restrict the user from logging in to Kloudfuse system.

Code Block
  user-mgmt-service:
    config:
      # # - in built scope types:
      # # Kloudfuse has following inbuilt RBAC policies
      # # rbac_allow_all - this policy grants admin like access (View + Edit capabilities for all data scope/workflows).
      # # rbac_allow_none - this policy denies all capabilities (No data view, No edit workflow capabilities)
      # # rbac_view_all - this policy grants viewer access to all data, no edit workflow capabilities.
      # #   
      default_rbac_policy: rbac_allow_none

Example: Default policy to provide custom scope

The following example uses a custom policy called rbac_viewer_target_namespace as the default policy. Please see here to learn more about policy definition.

Code Block
  user-mgmt-service:
    config:
      # # - in built scope types:
      # #   scope_allow_all -- this policy grants admin like access
      # #   scope_viewer_all -- this policy grants viewer access
      # #   scope_allow_none -- this policy denies all capabilities
      # #   
      default_rbac_policy: rbac_viewer_target_namespace

Apply changes

Note

Starting with Release 2.7.2, KloudFuse DOES NOT SUPPORT policy configuration at script level.
Use the Policy Management in the Kloud Fuse Admin tab, as we describe in Policy Configuration Management.

...

  • Editors
    default_rbac_policy: rbac_allow_all

  • Viewers
    default_rbac_policy: rbac_allow_all

To change the default policy for the various roles, change the default_rbac_policy in the values.yaml file.
See Change a Policy to set the policy in the UI.