You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
= Delegating role-based access controls (RBAC) access in {product}
5
+
6
+
An enterprise customer requires the ability to delegate role-based access control (RBAC) responsibilities to other individuals in the organization. In this scenario, you, as the administrator, can provide access to the RBAC plugin specifically to designated users, such as team leads. Each team lead is then able to manage permissions exclusively for users within their respective team or department, without visibility into or control over permissions outside their assigned scope. This approach allows team leads to manage access and permissions for their own teams independently, while administrators maintain global oversight.
7
+
8
+
In {product}, you can delegate RBAC access using the multitenancy feature of the RBAC plugin, specifically the `IS_OWNER` conditional rule. You can either use the web UI or the RBAC backend API, depending on your preferred workflow and level of automation:
9
+
10
+
* Use the web UI to create roles, assign users or groups, define permissions, and apply ownership conditions through an intuitive interface.
11
+
12
+
* Use the API for a more flexible and automatable approach, where you can programmatically manage roles, permissions, and ownership conditions using authenticated curl requests.
13
+
14
+
By delegating RBAC access through either method, you can expect the following outcomes:
15
+
16
+
* Team leads can manage RBAC settings for their teams independently.
17
+
* Visibility of other users' or teams' permissions is restricted.
18
+
* Administrators retain overarching control while delegating team-specific access.
19
+
20
+
.Prerequisites
21
+
* Your {product-very-short} instance is running with the RBAC plugin installed and configured.
22
+
* You have administrative access to {product-very-short}.
Copy file name to clipboardExpand all lines: modules/authorization/proc-delegating-rbac-access-api.adoc
+5-18Lines changed: 5 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,24 +1,13 @@
1
-
[id='proc-delegating-rbac-access_{context}']
2
-
= Delegating role-based access controls (RBAC) access in {product}
1
+
[id='proc-delegating-rbac-access-api_{context}']
2
+
= Delegating RBAC access in {product} by using API
3
3
4
-
An enterprise customer requires the ability to delegate role-based access control (RBAC) responsibilities to other individuals in the organization. In this scenario, you, as the administrator, can provide access to the RBAC plugin specifically to designated users, such as team leads. Each team lead is then able to manage permissions exclusively for users within their respective team or department, without visibility into or control over permissions outside their assigned scope. This approach allows team leads to manage access and permissions for their own teams independently, while administrators maintain global oversight.
5
-
6
-
In {product-very-short}, you can delegate RBAC access using the multitenancy feature of RBAC plugin, specifically the `IS_OWNER` conditional rule.
7
-
8
-
By delegating the RBAC access, you can expect the following outcomes:
9
-
10
-
* Team leads can manage RBAC settings for their teams independently.
11
-
* Visibility of other users' or teams' permissions is restricted.
12
-
* Administrators retain overarching control while delegating team-specific access.
4
+
You can delegate the RBAC access in {product} by using the RBAC backend API.
13
5
14
6
.Prerequisites
15
-
* Your {product-very-short} instance is up and running with RBAC plugin installed and configured.
16
-
* You have administrative access to {product-very-short}.
17
7
* You have API access using `curl` or another tool.
18
8
19
9
.Procedure
20
-
. In your {product-very-short} instance, navigate to the *Administration -> RBAC* page.
21
-
. Create a new role designated for team leads using the Web UI or API:
10
+
. Create a new role designated for team leads using the RBAC backend API:
22
11
+
23
12
--
24
13
.Example of creating a new role for the team lead using the RBAC backend API
@@ -35,11 +24,9 @@ curl -X POST 'http://localhost:7007/api/permission/roles' \
35
24
}
36
25
}'
37
26
----
38
-
39
-
For more information about creating a role using the Web UI, see xref:proc-rbac-ui-create-role_title-authorization[Creating a role in the {product} Web UI].
40
27
--
41
28
42
-
. Allow team leads to read catalog entities and create permissions in the RBAC plugin using the Web UI or the following API request:
29
+
. Allow team leads to read catalog entities and create permissions in the RBAC plugin using the following API request:
43
30
+
44
31
--
45
32
.Example of granting the team lead role permission to create RBAC policies and read catalog entities
0 commit comments