Skip to Content

Granting and Revoking Kubernetes Roles

Overview

Administrators can grant or revoke roles with Kubernetes API access permissions to users or user groups.

Granting Kubernetes Roles

Administrator > Kubernetes > K8s Access Control > Access Control

Administrator > Kubernetes > K8s Access Control > Access Control

  1. Navigate to Administrator > Kubernetes > K8s Access Control > Access Control menu.
  2. Select the user or user group to grant permissions to and move to the detailed page.
  3. Click the + Grant Roles button on the right of the Roles tab, check the checkbox on the left of the Role to grant, and specify the expiration date.
    1. You can search by Role name.
    2. Already assigned roles have disabled checkboxes.
    3. The list exposes the following information for each policy:
      1. Name : Role name
        • Provides a new window link to view role information.
      2. Description : Role detailed description
      3. Assigned Policies : Lists assigned policy list
    4. Expiration Date : Expiration date must be specified as required.
      • When set as default, it is set to one year from the current point, and can be set up to a maximum of one year.
  4. Click the Grant button to assign the checked target Role.
  5. (Clicking the Cancel button closes the modal without changes.)

Revoking Kubernetes Roles

image-20240721-070526.png

  1. Navigate to Administrator > Kubernetes > K8s Access Control > Access Control menu.
  2. Select the user or user group to revoke permissions from and move to the detailed page.
  3. In the Roles tab, click the Revoke button exposed in the column bar when checking the select all or individual selection box.
  4. When clicking the Revoke button in the confirmation window, the selected role permissions are revoked from the user/group and disappear from the list.
  5. (Clicking the Cancel button only closes the confirmation window.)

When revoking a Role, all access permissions that were granted to users and groups through that role are revoked.

Last updated on