Authorization Enterprise
This section provides a recommended way to configure RBAC in the context of policies. It is oriented to the journey that you expect your users to have.
View Resources
The policy journey in the UI involves several resources. We have the Policies that are used by the agent, the resulting Violations when the agent enforces those policies, and the PolicyConfigs that the user can configure to override policy parameters. The violations are essentially kubernetes events that contain the Validation object.
In order to view those resources, users would need to have read access to the policies
, policysconfigs
, and events
resource.
An example of a configuration to achieve this purpose could be seen below with policies-reader
role and developer-policies-reader
cluster role binding, to allow a group developer
to access all the policy-related resources.
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: policies-reader
rules:
- apiGroups: ["pac.weave.works"]
resources: ["policies", "policyconfigs"]
verbs: ["get", "list", "watch"]
- apiGroups: [""]
resources: ["events"]
verbs: ["get", "watch", "list"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: developer-policies-reader
subjects:
- kind: Group
name: developer
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole
name: policies-reader
apiGroup: rbac.authorization.k8s.io