Skip to content

Commit 66c3611

Browse files
pabel-rhjmagakjosephca
authored
RHIDP-4323: OCM permissions require additional permissionsto fully restrict resources (#692)
* draft 1: * Update modules/authorization/ref-rbac-permission-policies.adoc Co-authored-by: jmagak <[email protected]> --------- Co-authored-by: jmagak <[email protected]> Co-authored-by: Joseph Kim <[email protected]>
1 parent a78c2a9 commit 66c3611

File tree

1 file changed

+23
-1
lines changed

1 file changed

+23
-1
lines changed

modules/authorization/ref-rbac-permission-policies.adoc

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ You can define the following types of permissions in {product-short}:
88
* resource type
99
* basic
1010

11-
The distinction between the two permission types depend on whether a permission includes a defined resource type.
11+
The distinction between the two permission types depends on whether a permission includes a defined resource type.
1212

1313
You can define the resource type permission using either the associated resource type or the permission name as shown in the following example:
1414

@@ -181,6 +181,28 @@ Kubernetes permissions::
181181

182182
OCM permissions::
183183

184+
Basic OCM permissions only restrict access to the cluster view, but they do not prevent access to the Kubernetes clusters in the resource view. For more effective permissions, consider applying a conditional policy to restrict access to catalog entities that are of type `kubernetes-cluster`. Access restriction is dependent on the set of permissions granted to a role. For example, if the role had full permissions (`read`, `update`, and `delete`), then you must specify all its permissions in the `permissionMapping` field.
185+
186+
.Example permissionMapping definition
187+
[source,csv]
188+
----
189+
result: CONDITIONAL
190+
roleEntityRef: 'role:default/<YOUR_ROLE>'
191+
pluginId: catalog
192+
resourceType: catalog-entity
193+
permissionMapping:
194+
- read
195+
- update
196+
- delete
197+
conditions:
198+
not:
199+
rule: HAS_SPEC
200+
resourceType: catalog-entity
201+
params:
202+
key: type
203+
value: kubernetes-cluster
204+
----
205+
184206
[cols="15%,25%,15%,45%", frame="all", options="header"]
185207
|===
186208
|Name

0 commit comments

Comments
 (0)