Skip to content

Commit 7981ef0

Browse files
authored
Merge pull request #58961 from ousleyp/cnv-7098
CNV-7098: default and custom RBAC roles for OCP virt
2 parents c8bc03d + 628dc6d commit 7981ef0

File tree

2 files changed

+40
-1
lines changed

2 files changed

+40
-1
lines changed
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * virt/virt-additional-security-privileges-controller-and-launcher.adoc
4+
5+
:_content-type: REFERENCE
6+
[id="default-cluster-roles-for-virt_{context}"]
7+
= Default cluster roles for {VirtProductName}
8+
9+
By using cluster role aggregation, {VirtProductName} extends the default {product-title} cluster roles to include permissions for accessing virtualization objects.
10+
11+
.{VirtProductName} cluster roles
12+
[cols="1,1,4",options="header"]
13+
|===
14+
|Default cluster role
15+
|{VirtProductName} cluster role
16+
|{VirtProductName} cluster role description
17+
18+
.^| `view`
19+
.^|`kubevirt.io:view`
20+
| A user that can view all {VirtProductName} resources in the cluster but cannot create, delete, modify, or access them. For example, the user can see that a virtual machine (VM) is running but cannot shut it down or gain access to its console.
21+
22+
.^| `edit`
23+
.^|`kubevirt.io:edit`
24+
| A user that can modify all {VirtProductName} resources in the cluster. For example, the user can create VMs, access VM consoles, and delete VMs.
25+
26+
.^| `admin`
27+
.^|`kubevirt.io:admin`
28+
| A user that has full permissions to all {VirtProductName} resources, including the ability to delete collections of resources. The user can also view and modify the {VirtProductName} runtime configuration, which is located in the `HyperConverged` custom resource in the `openshift-cnv` namespace.
29+
|===

virt/virt-security-policies.adoc

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,18 @@ include::modules/virt-about-workload-security.adoc[leveloffset=+1]
1919

2020
include::modules/virt-additional-scc-for-kubevirt-controller.adoc[leveloffset=+1]
2121

22+
[id="authorization_virt-security-policies"]
23+
== Authorization
24+
25+
{VirtProductName} uses xref:../authentication/using-rbac.adoc#using-rbac[role-based access control] (RBAC) for authorization. For example, an administrator can create an RBAC role that provides the permissions required to launch a virtual machine. The administrator can then restrict access to that feature by binding the role to specific users.
26+
27+
include::modules/virt-default-cluster-roles.adoc[leveloffset=+2]
28+
2229
[role="_additional-resources"]
2330
[id="additional-resources_{context}"]
2431
== Additional resources
2532
* xref:../authentication/managing-security-context-constraints.adoc#security-context-constraints-about_configuring-internal-oauth[Managing security context constraints]
26-
* xref:../authentication/using-rbac.adoc#using-rbac[Using RBAC to define and apply permissions]
33+
* xref:../authentication/using-rbac.adoc#using-rbac[Using RBAC to define and apply permissions]
34+
* xref:../authentication/using-rbac.adoc#creating-cluster-role_using-rbac[Creating a cluster role]
35+
* xref:../authentication/using-rbac.adoc#cluster-role-binding-commands_using-rbac[Cluster role binding commands]
36+
* xref:../virt/virtual_machines/cloning_vms/virt-enabling-user-permissions-to-clone-datavolumes.adoc#virt-enabling-user-permissions-to-clone-datavolumes[Enabling user permissions to clone data volumes across namespaces]

0 commit comments

Comments
 (0)