Skip to content

Commit 364984e

Browse files
committed
RHIDP-3973 configuring policy administrators
Signed-off-by: Fabrice Flore-Thébault <[email protected]>
1 parent 119ac1f commit 364984e

File tree

1 file changed

+31
-2
lines changed

1 file changed

+31
-2
lines changed

modules/authorization/proc-enabling-the-rbac-plugin.adoc

Lines changed: 31 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,15 @@
11
[id='proc-enabling-rbac_{context}']
2-
= Enabling Role-Based Access Control (RBAC)
2+
= Enabling and giving access to the Role-Based Access Control (RBAC) feature
33

44
The Role-Based Access Control (RBAC) feature is disabled by default.
55
Enable the RBAC plugin to start using RBAC features.
66

77
.Prerequisites
88
* You have link:{linkadminguide}#assembly-add-custom-app-file-openshift_admin-rhdh[added a custom {product-short} application configuration], and have sufficient permissions to modify it.
9+
* You have link:{authentication-book-title}[enabled an authentication provider].
910

1011
.Procedure
11-
* The RBAC plugin is installed but disabled by default.
12+
. The RBAC plugin is installed but disabled by default.
1213
To enable the `./dynamic-plugins/dist/janus-idp-backstage-plugin-rbac` plugin, edit your `dynamic-plugins.yaml` with following content.
1314
+
1415
.`dynamic-plugins.yaml` fragment
@@ -20,3 +21,31 @@ plugins:
2021
----
2122
+
2223
See link:{installing-and-viewing-dynamic-plugins-url}[{installing-and-viewing-dynamic-plugins-title}].
24+
25+
. Declare policy administrators to allow a certain limited number of authenticated users to configure RBAC policies by using the REST API or the Web UI, rather than editing the CSV file.
26+
The actual policies are defined in a separate CSV file and referenced in the app-config-rhdh ConfigMap.
27+
+
28+
To declare users such as __<your_policy_administrator_name>_ as policy administrators, edit your custom {product-short} ConfigMap, such as `app-config-rhdh`, and add following lines to the `app-config-rhdh.yaml` content:
29+
+
30+
.`app-config.yaml` fragment
31+
[source,yaml,subs=+quotes]
32+
----
33+
permission:
34+
enabled: true
35+
rbac:
36+
admin:
37+
users:
38+
- name: user:default/__<your_policy_administrator_name>__
39+
----
40+
41+
.Verification
42+
. Sign out from the existing {product} session and log in again using the declared policy administrator account.
43+
. Navigate to the Catalog page in RHDH.
44+
The Create button is not visible.
45+
You are not allowed to create new components.
46+
. Navigate to the API page.
47+
The Register button is not visible.
48+
49+
.Next steps
50+
* With RBAC enabled, most features are disabled by default.
51+
Explicitly enable permissions to resources in {product-short}.

0 commit comments

Comments
 (0)