Skip to content

Commit 043cb58

Browse files
committed
Roles, personas, users, and Permissions for MTV 7.1
1 parent 306897c commit 043cb58

File tree

1 file changed

+38
-12
lines changed

1 file changed

+38
-12
lines changed

docs/topics/mta-7-installing-web-console-on-openshift.adoc

Lines changed: 38 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
//
33
// * docs/web-console-guide/master.adoc
44

5-
:_content-type: PROCEDURE
5+
:_mod-docs-content-type: PROCEDURE
66
[id="mta-7-installing-web-console-on-openshift_{context}"]
77

88
= Installing the {ProductName} {WebName}
@@ -16,7 +16,7 @@ The {ProductShortName} Operator is a structural layer that manages resources dep
1616
[id="openshift-persistent-volume-requirements_{context}"]
1717
== Persistent volume requirements
1818

19-
To successfully deploy, the {ProductShortName} Operator requires 3 RWO persistent volumes (PVs) used by different components. If the `rwx_supported` configuration option is set to `true`, the {ProductShortName} Operator requires an additional 2 RWX PVs that are used by Maven and the hub file storage. The PVs are described in the table below:
19+
To successfully deploy, the {ProductShortName} Operator requires 3 RWO persistent volumes (PVs) used by different components. If the `rwx_supported` configuration option is set to `true`, the {ProductShortName} Operator requires an additional 2 RWX PVs that are used by Maven and the hub file storage. The PVs are described in the following table:
2020

2121
.Required persistent volumes
2222
[cols="25%,25%,25%,25%", options="header"]
@@ -52,6 +52,7 @@ To successfully deploy, the {ProductShortName} Operator requires 3 RWO persisten
5252
|Maven m2 cache; required if the `rwx_supported` configuration option is set to `true`
5353
|====
5454

55+
[id="installing-mtv-operator-and-ui_{context}"]
5556
== Installing the {ProductName} Operator and the {WebName}
5657

5758
You can install the {ProductName} ({ProductShortName}) and the {WebName} on Red Hat OpenShift versions 4.13-4.15.
@@ -210,6 +211,7 @@ mirror:
210211
helm: {}
211212
----
212213

214+
[id="memory-requirements-mtv-openshift-local_{context}"]
213215
== Memory requirements for running {ProductShortName} on Red Hat OpenShift Local
214216

215217
When installed on https://developers.redhat.com/products/openshift-local/overview[Red Hat OpenShift Local], {ProductShortName} requires a minimum amount of memory to complete its analysis. Adding memory makes the analysis process run faster. The table below describes the {ProductShortName} performance with varying amounts of memory.
@@ -220,7 +222,6 @@ When installed on https://developers.redhat.com/products/openshift-local/overvie
220222
|Memory (GiB)
221223
|Description
222224

223-
224225
|`10`
225226
|{ProductShortName} cannot run the analysis due to insufficient memory
226227

@@ -264,21 +265,20 @@ To prevent out-of-memory events and protect nodes, use the `--eviction-hard` set
264265

265266
The amount of memory available for running pods on this node is 28.9 GiB. This amount is calculated by subtracting the `system-reserved` and `eviction-hard` values from the overall capacity of the node. If the memory usage exceeds this amount, the node starts evicting pods.
266267

267-
268+
[id="rhsso-overview-mta_{context}"]
268269
== Red Hat Single Sign-On
269270
{ProductShortName} delegates authentication and authorization to a https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6[Red Hat Single Sign-On] (RHSSO) instance managed by the {ProductShortName} operator. Aside from controlling the full lifecycle of the managed RHSSO instance, the {ProductShortName} operator also manages the configuration of a dedicated https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms[realm] that contains all the roles and permissions that {ProductShortName} requires.
270271

271-
If an advanced configuration is required in the {ProductShortName} managed RHSSO instance, such as https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/user-storage-federation#adding_a_provider[adding
272-
a provider for User Federation] or https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/identity_broker[integrating identity providers], users can log into the RHSSO https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms#using_the_admin_console[Admin
273-
Console] through the `/auth/admin` subpath in the `{LC_PSN}-ui` route. The admin credentials to access the {ProductShortName} managed RHSSO instance can be retrieved from the `credential-mta-rhsso` secret available in the namespace in which the {WebName} was installed.
272+
If an advanced configuration is required in the {ProductShortName} managed RHSSO instance, such as https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/user-storage-federation#adding_a_provider[adding a provider for User Federation] or https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/identity_broker[integrating identity providers], users can log into the RHSSO https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms#using_the_admin_console[Admin Console] through the `/auth/admin` subpath in the `{LC_PSN}-ui` route. The admin credentials to access the {ProductShortName} managed RHSSO instance can be retrieved from the `credential-mta-rhsso` secret available in the namespace in which the {WebName} was installed.
274273

275274
A dedicated route for the {ProductShortName} managed RHSSO instance can be created by setting the `rhsso_external_access` parameter to `True` in the *Tackle CR* that manages the {ProductShortName} instance.
276275

277276
For more information, see
278-
https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/red_hat_single_sign_on_features_and_concepts[Red
279-
Hat Single Sign-On features and concepts].
277+
https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/red_hat_single_sign_on_features_and_concepts[Red Hat Single Sign-On features and concepts].
278+
280279

281-
Roles, Personas, Users, and Permissions
280+
[id="mta-roles-personas-users-permissions_{context}"]
281+
=== Roles, Personas, Users, and Permissions
282282

283283
{ProductShortName} makes use of three roles, each of which corresponds to a persona:
284284

@@ -302,16 +302,42 @@ The roles are already defined in your RHSSO instance. You do not need to create
302302

303303
If you are an {ProductShortName} administrator, you can create users in your RHSSO and assign each user one or more roles, one role per persona.
304304

305-
=== Roles and Personas
305+
[id="mta-roles-personas-ui-views_{context}"]
306+
==== Roles, personas, and access to {WebName} views
306307

307308
Although a user can have more than one role, each role corresponds to a specific persona:
308309

309310
* Administrator: An administrator has all the permissions that architects and migrators have, along with access to some application-wide configuration parameters that other users can consume but cannot change or view. Examples: Git credentials, Maven `settings.xml` files.
311+
+
312+
Administrators have complete access to both the *Administration* and *Migration* views. Administrators can perform all actions supported by these views.
310313

311314
* Architect: A technical lead for the migration project that can create and modify applications and information related to them. An architect cannot modify or delete sensitive information, but can consume it. Example: Associate an existing credential to the repository of a specific application.
312315

313-
* Migrator: A developer who can analyze applications, but not create, modify, or delete them.
316+
* Migrator: A user who can analyze applications, but not create, modify, or delete them.
317+
+
318+
Architects and migrators do not have any access to the *Administration* view. They cannot even see it. Architects and migrators can see all elements of *Migration* view, but their ability to perform actions in *Migration* view depends on the permissions granted to their role.
319+
320+
321+
The ability of administrators, architects, and migrators to access the *Administration* and *Migration* views of the {ProductShortName} {WebName} is summarized in the table below:
322+
323+
.Roles vs. access to {ProductShortName} views
324+
[cols=",,,",options="header",]
325+
|===
326+
|Menu
327+
|Architect
328+
|Migrator
329+
|Admin
330+
|Administration
331+
|No
332+
|No
333+
|Yes
334+
|Migration
335+
|Yes
336+
|Yes
337+
|Yes
338+
|===
314339

340+
[id="mta-roles-permissions_{context}"]
315341
==== Roles and permissions
316342

317343
The following table contains the roles and permissions (scopes) that {ProductShortName} seeds the managed RHSSO instance with:

0 commit comments

Comments
 (0)