Skip to Content

Setting Kubernetes Roles

Overview

Role-Based Access Control (RBAC) based on Kubernetes roles within the organization is applied to allow or restrict user access to Kubernetes. You can assign configured Roles to users or user groups. Roles are used to combine multiple policies into a single role definition.

Assigning Role Policies

Administrator > Kubernetes > K8s Access Control > Roles > List Details

Administrator > Kubernetes > K8s Access Control > Roles > List Details

  1. Navigate to the Administrator > Kubernetes > K8s Access Control > Roles menu.
  2. Click on the target Role row in the Roles list to go to the details page.
  3. Click the + Assign Policies button on the right side of the Policies tab.
  4. Review the policies to assign, then check the checkbox on the left.
image-20240721-071758.png
  1. You can search by policy name.
  2. Policies that are already assigned will have their checkboxes disabled.
  3. The list displays the following information for each policy:
    • Name : Policy name
      • A modal link is provided to view policy information.
        image-20240721-071822.png
  4. Click the Assign button to assign the selected policies.
  5. (Clicking the Cancel button closes the modal without any changes.)

Unassigning Role Policies

image-20240721-071910.png
  1. Navigate to the Administrator > Kubernetes > K8s Access Control > Roles menu.
  2. Click on the target Role row in the Roles list to go to the details page.
  3. In the Policies tab, check the select-all or individual selection checkboxes, then click the Unassign button that appears in the column bar.
image-20240721-071940.png
  1. When you click the Unassign button in the confirmation dialog, the selected items are unassigned and removed from the list.
  2. (Clicking the Cancel button only closes the confirmation dialog.)

When a Policy is unassigned, all access permissions that were granted to users and groups through that policy will be revoked.

Last updated on