You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To successfully deploy, the {ProductShortName} Operator requires 3 RWO persistent volumes (PVs) used by different components. If the `rwx_supported` configuration option is set to `true`, the {ProductShortName} Operator requires an additional 2 RWX PVs that are used by Maven and the hub file storage. The PVs are described in the table below:
19
+
To successfully deploy, the {ProductShortName} Operator requires 3 RWO persistent volumes (PVs) used by different components. If the `rwx_supported` configuration option is set to `true`, the {ProductShortName} Operator requires an additional 2 RWX PVs that are used by Maven and the hub file storage. The PVs are described in the following table:
20
20
21
21
.Required persistent volumes
22
22
[cols="25%,25%,25%,25%", options="header"]
@@ -52,6 +52,7 @@ To successfully deploy, the {ProductShortName} Operator requires 3 RWO persisten
52
52
|Maven m2 cache; required if the `rwx_supported` configuration option is set to `true`
53
53
|====
54
54
55
+
[id="installing-mtv-operator-and-ui_{context}"]
55
56
== Installing the {ProductName} Operator and the {WebName}
56
57
57
58
You can install the {ProductName} ({ProductShortName}) and the {WebName} on Red Hat OpenShift versions 4.13-4.15.
== Memory requirements for running {ProductShortName} on Red Hat OpenShift Local
214
216
215
217
When installed on https://developers.redhat.com/products/openshift-local/overview[Red Hat OpenShift Local], {ProductShortName} requires a minimum amount of memory to complete its analysis. Adding memory makes the analysis process run faster. The table below describes the {ProductShortName} performance with varying amounts of memory.
@@ -220,7 +222,6 @@ When installed on https://developers.redhat.com/products/openshift-local/overvie
220
222
|Memory (GiB)
221
223
|Description
222
224
223
-
224
225
|`10`
225
226
|{ProductShortName} cannot run the analysis due to insufficient memory
226
227
@@ -264,21 +265,20 @@ To prevent out-of-memory events and protect nodes, use the `--eviction-hard` set
264
265
265
266
The amount of memory available for running pods on this node is 28.9 GiB. This amount is calculated by subtracting the `system-reserved` and `eviction-hard` values from the overall capacity of the node. If the memory usage exceeds this amount, the node starts evicting pods.
266
267
267
-
268
+
[id="rhsso-overview-mta_{context}"]
268
269
== Red Hat Single Sign-On
269
270
{ProductShortName} delegates authentication and authorization to a https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6[Red Hat Single Sign-On] (RHSSO) instance managed by the {ProductShortName} operator. Aside from controlling the full lifecycle of the managed RHSSO instance, the {ProductShortName} operator also manages the configuration of a dedicated https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms[realm] that contains all the roles and permissions that {ProductShortName} requires.
270
271
271
-
If an advanced configuration is required in the {ProductShortName} managed RHSSO instance, such as https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/user-storage-federation#adding_a_provider[adding
272
-
a provider for User Federation] or https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/identity_broker[integrating identity providers], users can log into the RHSSO https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms#using_the_admin_console[Admin
273
-
Console] through the `/auth/admin` subpath in the `{LC_PSN}-ui` route. The admin credentials to access the {ProductShortName} managed RHSSO instance can be retrieved from the `credential-mta-rhsso` secret available in the namespace in which the {WebName} was installed.
272
+
If an advanced configuration is required in the {ProductShortName} managed RHSSO instance, such as https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/user-storage-federation#adding_a_provider[adding a provider for User Federation] or https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/identity_broker[integrating identity providers], users can log into the RHSSO https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms#using_the_admin_console[Admin Console] through the `/auth/admin` subpath in the `{LC_PSN}-ui` route. The admin credentials to access the {ProductShortName} managed RHSSO instance can be retrieved from the `credential-mta-rhsso` secret available in the namespace in which the {WebName} was installed.
274
273
275
274
A dedicated route for the {ProductShortName} managed RHSSO instance can be created by setting the `rhsso_external_access` parameter to `True` in the *Tackle CR* that manages the {ProductShortName} instance.
https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/red_hat_single_sign_on_features_and_concepts[Red Hat Single Sign-On features and concepts].
{ProductShortName} makes use of three roles, each of which corresponds to a persona:
284
284
@@ -302,16 +302,42 @@ The roles are already defined in your RHSSO instance. You do not need to create
302
302
303
303
If you are an {ProductShortName} administrator, you can create users in your RHSSO and assign each user one or more roles, one role per persona.
304
304
305
-
=== Roles and Personas
305
+
[id="mta-roles-personas-ui-views_{context}"]
306
+
==== Roles, personas, and access to {WebName} views
306
307
307
308
Although a user can have more than one role, each role corresponds to a specific persona:
308
309
309
310
* Administrator: An administrator has all the permissions that architects and migrators have, along with access to some application-wide configuration parameters that other users can consume but cannot change or view. Examples: Git credentials, Maven `settings.xml` files.
311
+
+
312
+
Administrators have complete access to both the *Administration* and *Migration* views. Administrators can perform all actions supported by these views.
310
313
311
314
* Architect: A technical lead for the migration project that can create and modify applications and information related to them. An architect cannot modify or delete sensitive information, but can consume it. Example: Associate an existing credential to the repository of a specific application.
312
315
313
-
* Migrator: A developer who can analyze applications, but not create, modify, or delete them.
316
+
* Migrator: A user who can analyze applications, but not create, modify, or delete them.
317
+
+
318
+
Architects and migrators do not have any access to the *Administration* view. They cannot even see it. Architects and migrators can see all elements of *Migration* view, but their ability to perform actions in *Migration* view depends on the permissions granted to their role.
319
+
320
+
321
+
The ability of administrators, architects, and migrators to access the *Administration* and *Migration* views of the {ProductShortName} {WebName} is summarized in the table below:
322
+
323
+
.Roles vs. access to {ProductShortName} views
324
+
[cols=",,,",options="header",]
325
+
|===
326
+
|Menu
327
+
|Architect
328
+
|Migrator
329
+
|Admin
330
+
|Administration
331
+
|No
332
+
|No
333
+
|Yes
334
+
|Migration
335
+
|Yes
336
+
|Yes
337
+
|Yes
338
+
|===
314
339
340
+
[id="mta-roles-permissions_{context}"]
315
341
==== Roles and permissions
316
342
317
343
The following table contains the roles and permissions (scopes) that {ProductShortName} seeds the managed RHSSO instance with:
0 commit comments