Skip to content
Merged
Show file tree
Hide file tree
Changes from 6 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions assemblies/assembly-configuring-authorization-in-rhdh.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -4,13 +4,13 @@
include::modules/authorization/con-rbac-overview.adoc[leveloffset=+1]


include::modules/authorization/ref-rbac-permission-policies.adoc[leveloffset=+1]
include::modules/authorization/proc-enabling-the-rbac-plugin.adoc[leveloffset=+1]


include::modules/authorization/con-rbac-config-permission-policies.adoc[leveloffset=+2]
include::modules/authorization/ref-rbac-permission-policies.adoc[leveloffset=+1]


include::modules/authorization/con-rbac-config-permission-policies-admin.adoc[leveloffset=+3]
include::modules/authorization/con-rbac-config-permission-policies.adoc[leveloffset=+2]


include::modules/authorization/con-rbac-config-permission-policies-external-file.adoc[leveloffset=+3]
Expand Down

This file was deleted.

53 changes: 53 additions & 0 deletions modules/authorization/proc-enabling-the-rbac-plugin.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,53 @@
[id='enabling-and-giving-access-to-rbac']
= Enabling and giving access to the Role-Based Access Control (RBAC) feature

The Role-Based Access Control (RBAC) feature is disabled by default.
Enable the RBAC plugin and declare policy administrators to start using RBAC features.

The permission policies for users and groups in the {product-short} are managed by permission policy administrators. Only permission policy administrators can access the Role-Based Access Control REST API.

.Prerequisites
* You have link:{linkadminguide}#assembly-add-custom-app-file-openshift_admin-rhdh[added a custom {product-short} application configuration], and have sufficient permissions to modify it.
* You have link:{authentication-book-title}[enabled an authentication provider].

.Procedure
. The RBAC plugin is installed but disabled by default.
To enable the `./dynamic-plugins/dist/janus-idp-backstage-plugin-rbac` plugin, edit your `dynamic-plugins.yaml` with following content.
+
.`dynamic-plugins.yaml` fragment
[source,yaml]
----
plugins:
- package: ./dynamic-plugins/dist/janus-idp-backstage-plugin-rbac
disabled: false
----
+
See link:{installing-and-viewing-dynamic-plugins-url}[{installing-and-viewing-dynamic-plugins-title}].

. Declare policy administrators to allow a certain limited number of authenticated users to configure RBAC policies by using the REST API or the Web UI, rather than editing the CSV file.
The actual policies are defined in a separate CSV file and referenced in the app-config-rhdh ConfigMap.
+
To declare users such as __<your_policy_administrator_name>_ as policy administrators, edit your custom {product-short} ConfigMap, such as `app-config-rhdh`, and add following lines to the `app-config-rhdh.yaml` content:
+
.`app-config.yaml` fragment
[source,yaml,subs=+quotes]
----
permission:
enabled: true
rbac:
admin:
users:
- name: user:default/__<your_policy_administrator_name>__
----

.Verification
. Sign out from the existing {product} session and log in again using the declared policy administrator account.
. With RBAC enabled, most features are disabled by default.
.. Navigate to the Catalog page in RHDH.
The Create button is not visible.
You are not allowed to create new components.
.. Navigate to the API page.
The Register button is not visible.

.Next steps
* Explicitly enable permissions to resources in {product-short}.