Access Control
Overview
Supports granting and revoking access permissions to Kubernetes clusters managed by the organization for QueryPie users and groups. Access Control represents the final step in implementing and applying Kubernetes access permissions.

Administrator > Kubernetes > K8s Access Control > Access Control
Viewing Access Control Status

Administrator > Kubernetes > K8s Access Control > Access Control > List Details
- Navigate to Administrator > Kubernetes > K8s Access Control > Access Control menu.
 - You can search by user/group name using the search box in the top left of the table.
 - You can refresh the user/group list using the refresh button in the top right of the table.
 - The table list exposes the following information for each user/group:
- User Type : User/group type
 - Provider : Represents the ledger of the user/group
 - Name : User/group name
 - Members : List of members belonging to the group
 - Roles : Number of granted Roles
 
 - Click on a row in the Access Control list to move to the detailed page for the target user/group.
- Roles
 - This is the default tab where you can view the list of granted Roles.
 - You can search by Role name.
 - The list exposes the following information for each Role:
- Name : Role name
 - Description : Role detailed description
 - Expiration Date : Expiration date
 - Last Access At : Last call date and time for the role
 - Granted At : Date and time when the Role was granted to the user/group
 - Granted By : Administrator name who granted the Role to the user/group
 
 - Click on each Role row to provide detailed information of the Role in drawer format.
- Basic information is exposed at the top as follows:
- Name  : Role name
- (You can open the Role detailed page link in a new window.)
 
 - Description : Role detailed description
 - Granted At : Date and time when the Role was granted to the user/group
 - Granted By : Administrator name who granted the Role to the user/group
 - Last Access At : Last call date and time for the role
 - Expiration Date : Expiration date
 
 - Name  : Role name
 - Policies assigned to the role are exposed as a list at the bottom.
- Name  : Policy name
- (Provides a link to view policy information.)
 
 - Description : Policy detailed description
 - Version : Policy version
 - Assigned At : Assignment date and time
 - Assigned By : Administrator name who assigned the policy
 
 - Name  : Policy name
 
 - Basic information is exposed at the top as follows:
 - Clusters
- Lists Kubernetes clusters accessible through granted Roles.
 - You can search by Cluster name and Role name.
 - The list exposes the following information for each cluster:
- Name : Cluster name
 - Version : Kubernetes version
 - API URL : Cluster API URL
 - Cloud Provider : Connected platform (displayed as hyphen for manual clusters)
 - Tags : List of tags attached to the cluster
 - Role : List of related Roles
 - Created At : Cluster initial creation date and time
 - Updated At : Cluster last modification date and time
 
 
 
 
Processing Method for Granted Roles with Expired Expiration Date
- For Roles that have reached the Expiration Date among Roles granted to users or groups, the following actions occur:
- The Role row is automatically removed from the Roles tab in the Access Control detailed page.
 - The cluster row that was accessible through the Role is automatically removed from the Clusters tab in the Access Control detailed page.
 - A “Role Revoked” log is left in Audit > Kubernetes > Kubernetes Role History with Action By marked as “System”.
 
 
Last updated on