You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/topics/mta-7-installing-web-console-on-openshift.adoc
+28-9Lines changed: 28 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -161,7 +161,7 @@ The most commonly used CR settings are listed in this table:
161
161
|====
162
162
+
163
163
.Example YAML file
164
-
[sample,YAML]
164
+
[source,YAML]
165
165
----
166
166
kind: Tackle
167
167
apiVersion: tackle.konveyor.io/v1alpha1
@@ -264,16 +264,11 @@ To prevent out-of-memory events and protect nodes, use the `--eviction-hard` set
264
264
265
265
The amount of memory available for running pods on this node is 28.9 GiB. This amount is calculated by subtracting the `system-reserved` and `eviction-hard` values from the overall capacity of the node. If the memory usage exceeds this amount, the node starts evicting pods.
266
266
267
-
268
267
== Red Hat Single Sign-On
269
-
{ProductShortName} delegates authentication and authorization to a
Hat Single Sign-On] (RHSSO) instance managed by the {ProductShortName} operator. Aside from controlling the full lifecycle of the managed RHSSO instance, the {ProductShortName} operator also manages the configuration of a dedicated
268
+
{ProductShortName} delegates authentication and authorization to a https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6[Red Hat Single Sign-On] (RHSSO) instance managed by the {ProductShortName} operator. Aside from controlling the full lifecycle of the managed RHSSO instance, the {ProductShortName} operator also manages the configuration of a dedicated
272
269
https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms[realm] that contains all the roles and permissions that {ProductShortName} requires.
273
270
274
-
If an advanced configuration is required in the {ProductShortName} managed RHSSO instance, such as https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/user-storage-federation#adding_a_provider[adding
275
-
a provider for User Federation] or https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/identity_broker[integrating
276
-
identity providers], users can log into the RHSSO https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms#using_the_admin_console[Admin
271
+
If an advanced configuration is required in the {ProductShortName} managed RHSSO instance, such as https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/user-storage-federation#adding_a_provider[adding a provider for User Federation] or https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/identity_broker[integrating identity providers], administrators can log in to the RHSSO https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms#using_the_admin_console[Admin
277
272
Console] through the `/auth/admin` subpath in the `{LC_PSN}-ui` route. The admin credentials to access the {ProductShortName} managed RHSSO instance can be retrieved from the `credential-mta-rhsso` secret available in the namespace in which the {WebName} was installed.
278
273
279
274
A dedicated route for the {ProductShortName} managed RHSSO instance can be created by setting the `rhsso_external_access` parameter to `True` in the *Tackle CR* that manages the {ProductShortName} instance.
{ProductShortName} makes use of three roles or personas:
285
+
286
+
* `tackle-admin` (administrator)
287
+
* `tackle-architect` (architect)
288
+
* `tackle-migrator` (migrator)
289
+
290
+
These roles are already defined in your RHSSO instance. You do not need to create them.
291
+
292
+
If you are an {ProjectShortName} administrator, you can create users in your RHSSO and assign each user one or more roles
293
+
294
+
==== Definitions of Roles
295
+
296
+
Although a user can have more than one role, each role has a specific definition:
297
+
298
+
* Administrator: An administrator has all the permissions that architects and migrators have, along with access to some application-wide configuration parameters that other users can consume but not change or browse. Examples: Git credentials, Maven `settings.xml` files.
299
+
300
+
* Architect: A technical lead for the migration project that can create and modify applications and information related to them. An architect cannot modify or delete sensitive information, but can consume it. Example: Associate an existing credential to the repository of a specific application.
301
+
302
+
* Migrator: A developer who can analyze applications, but not create, modify, or delete them.
303
+
304
+
==== Roles and permissions
286
305
287
306
The following table contains the roles and permissions (scopes) that {ProductShortName} seeds the managed RHSSO instance with:
0 commit comments