Skip to content

Commit a2cbc95

Browse files
committed
Roles, Users, and Permissions in MTV
1 parent 61244ef commit a2cbc95

File tree

1 file changed

+28
-9
lines changed

1 file changed

+28
-9
lines changed

docs/topics/mta-7-installing-web-console-on-openshift.adoc

Lines changed: 28 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ The most commonly used CR settings are listed in this table:
161161
|====
162162
+
163163
.Example YAML file
164-
[sample,YAML]
164+
[source,YAML]
165165
----
166166
kind: Tackle
167167
apiVersion: tackle.konveyor.io/v1alpha1
@@ -264,16 +264,11 @@ To prevent out-of-memory events and protect nodes, use the `--eviction-hard` set
264264

265265
The amount of memory available for running pods on this node is 28.9 GiB. This amount is calculated by subtracting the `system-reserved` and `eviction-hard` values from the overall capacity of the node. If the memory usage exceeds this amount, the node starts evicting pods.
266266

267-
268267
== Red Hat Single Sign-On
269-
{ProductShortName} delegates authentication and authorization to a
270-
https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6[Red
271-
Hat Single Sign-On] (RHSSO) instance managed by the {ProductShortName} operator. Aside from controlling the full lifecycle of the managed RHSSO instance, the {ProductShortName} operator also manages the configuration of a dedicated
268+
{ProductShortName} delegates authentication and authorization to a https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6[Red Hat Single Sign-On] (RHSSO) instance managed by the {ProductShortName} operator. Aside from controlling the full lifecycle of the managed RHSSO instance, the {ProductShortName} operator also manages the configuration of a dedicated
272269
https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms[realm] that contains all the roles and permissions that {ProductShortName} requires.
273270

274-
If an advanced configuration is required in the {ProductShortName} managed RHSSO instance, such as https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/user-storage-federation#adding_a_provider[adding
275-
a provider for User Federation] or https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/identity_broker[integrating
276-
identity providers], users can log into the RHSSO https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms#using_the_admin_console[Admin
271+
If an advanced configuration is required in the {ProductShortName} managed RHSSO instance, such as https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/user-storage-federation#adding_a_provider[adding a provider for User Federation] or https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/identity_broker[integrating identity providers], administrators can log in to the RHSSO https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms#using_the_admin_console[Admin
277272
Console] through the `/auth/admin` subpath in the `{LC_PSN}-ui` route. The admin credentials to access the {ProductShortName} managed RHSSO instance can be retrieved from the `credential-mta-rhsso` secret available in the namespace in which the {WebName} was installed.
278273

279274
A dedicated route for the {ProductShortName} managed RHSSO instance can be created by setting the `rhsso_external_access` parameter to `True` in the *Tackle CR* that manages the {ProductShortName} instance.
@@ -282,7 +277,31 @@ For more information, see
282277
https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/red_hat_single_sign_on_features_and_concepts[Red
283278
Hat Single Sign-On features and concepts].
284279

285-
=== Roles and Permissions
280+
=== Roles, Users, and Permissions
281+
282+
==== Roles and Users
283+
284+
{ProductShortName} makes use of three roles or personas:
285+
286+
* `tackle-admin` (administrator)
287+
* `tackle-architect` (architect)
288+
* `tackle-migrator` (migrator)
289+
290+
These roles are already defined in your RHSSO instance. You do not need to create them.
291+
292+
If you are an {ProjectShortName} administrator, you can create users in your RHSSO and assign each user one or more roles
293+
294+
==== Definitions of Roles
295+
296+
Although a user can have more than one role, each role has a specific definition:
297+
298+
* Administrator: An administrator has all the permissions that architects and migrators have, along with access to some application-wide configuration parameters that other users can consume but not change or browse. Examples: Git credentials, Maven `settings.xml` files.
299+
300+
* Architect: A technical lead for the migration project that can create and modify applications and information related to them. An architect cannot modify or delete sensitive information, but can consume it. Example: Associate an existing credential to the repository of a specific application.
301+
302+
* Migrator: A developer who can analyze applications, but not create, modify, or delete them.
303+
304+
==== Roles and permissions
286305

287306
The following table contains the roles and permissions (scopes) that {ProductShortName} seeds the managed RHSSO instance with:
288307

0 commit comments

Comments
 (0)