Skip to Content

Setting Kubernetes Roles

Overview

Apply role-based access control (Role-Based Access Control, RBAC) based on Kubernetes roles within the organization to allow or restrict user access to Kubernetes. You can grant set Roles to users or user groups. Roles are used to define multiple policies as a single role.

Assigning Role Policies

Administrator > Kubernetes > K8s Access Control > Roles > List Details

Administrator > Kubernetes > K8s Access Control > Roles > List Details

  1. Navigate to Administrator > Kubernetes > K8s Access Control > Roles menu.
  2. Click on the target Role row from the Roles list to move to the detailed page.
  3. Click the + Assign Policies button on the right of the Policies tab.
  4. Review the policies to assign, then check the checkbox on the left.
    1. You can search by policy name.
    2. Already assigned policies have disabled checkboxes.
    3. The list exposes the following information for each policy:
      • Name : Policy name
        • Provides a modal link to view policy information.
  5. Press the Assign button to assign the checked target policies.
  6. (Pressing the Cancel button closes the modal without changes.)

Unassigning Role Policies

image-20240721-071910.png

  1. Navigate to Administrator > Kubernetes > K8s Access Control > Roles menu.
  2. Click on the target Role row from the Roles list to move to the detailed page.
  3. In the Policies tab, click the Unassign button exposed in the column bar when checking the select all or individual selection box.
  4. When clicking the Unassign button in the confirmation window, the selected items are unassigned and disappear from the list.
  5. (Clicking the Cancel button only closes the confirmation window.)

When unassigning a Policy, all access permissions that were granted to users and groups through that policy are revoked.

Last updated on