|
1 | 1 | [id='configuring-authorization-in-rhdh'] |
2 | 2 | = Configuring authorization in {product} |
3 | 3 |
|
4 | | -include::modules/authorization/con-rbac-overview.adoc[leveloffset=+1] |
| 4 | +In link:{authorization-book-url}[{authentication-book-title}], you learnt how to authenticate users to {product}. |
| 5 | +{product-short} knowns who the users are. |
| 6 | + |
| 7 | +In this book, learn how to authorize users to perform actions in {product-short}. |
| 8 | +Define what users can do in {product-short}. |
| 9 | + |
| 10 | +Role-Based Access Control (RBAC) is a security concept that controls access to resources in a system, and specifies a mapping between users of the system, and the actions they can perform on resources in the system. |
| 11 | +You define roles with specific permissions, and then assign the roles to users and groups. |
| 12 | + |
| 13 | +RBAC on {product-short} is built on top of the Permissions framework, which defines RBAC policies in code. |
| 14 | +Rather than defining policies in code, |
| 15 | +the {product-short} RBAC feature allows you |
| 16 | +to define policies in a declarative fashion using a simple CSV based format. |
| 17 | +You can define the policies by using {product-short} web interface or REST API, rather than editing the CSV directly. |
| 18 | + |
| 19 | +To apply RBAC in {product-short}: |
| 20 | + |
| 21 | +. The {product-short} administrator sets up the RBAC feature: |
| 22 | +.. Enable the RBAC feature |
| 23 | +.. Configure Policy Administrators |
| 24 | + |
| 25 | +. The {product-short} policy administrator configures your RBAC policies: |
| 26 | +.. Define roles with specific permissions |
| 27 | +.. Assign the roles to users and groups |
5 | 28 |
|
6 | 29 |
|
7 | 30 | include::modules/authorization/ref-rbac-permission-policies.adoc[leveloffset=+1] |
|
0 commit comments