Skip to main content
Starting with Orka 3.0, Orka uses Single Sign-On (SSO) and Kubernetes role-based access control (RBAC) for user management. Users log in with their MacStadium Customer Portal credentials. What they can do depends on the role assigned to their account.

How roles work

There are two places where roles exist — the Customer Portal and the Orka cluster — and they map to each other. Customer Portal roles:
  • Admin — full control of the Portal account and the Orka cluster. Can invite users, manage billing, and administer cluster resources.
  • Tech — developer access. Can deploy and manage VMs, images, and VM configs. Cannot manage users or namespaces.
  • Billing — read-only Portal access. Cannot perform any cluster actions.
Orka cluster roles:
  • Admin Portal users → Administrator cluster role
  • Tech Portal users → Technical cluster role
  • Service accounts — cluster-only accounts for CI/CD integrations. Not tied to a Portal account.

Role-based access matrix

Within the Customer Portal, the Admin, Tech, and Billing roles have the following capabilities: 23ce174-Screenshot_2023-09-15_at_13.41.41.png Within the Orka cluster:
OperationAdminTechBillingAdmin SA (Orka Small Teams-only)Regular SA
Log in with CP credentials
Log in with authentication token
Log out
Manage users
Manage service accounts, including token generation
Print authentication token
Manage namespaces
Manage role bindings
List nodes
Manage nodes
Access and work in the orka-default namespaceYes (Admin can revoke access)If created in orka-default; otherwise based on role bindings
Access and work in custom orka- namespacesBased on role bindingsIf created in the namespace; otherwise based on role bindings
View information about all VMs in the namespace
Deploy VMs in the namespace
Manage the VM state of all VMs in the namespace
Delete own VMs in the namespace
Delete other subjects’ VMs in the namespace
Manage VM configs (except deleting)
Delete own VM configs
Delete other owners’ VMs
Manage images
List and pull remote images
Manage ISOs
List and pull remote ISOs

Common admin workflows

Adding a user to the cluster

  1. In the MacStadium Customer Portal, an account Admin invites the user and sets their role (Admin or Tech).
  2. The user accepts the invite and sets their credentials.
  3. The user logs in to the Orka cluster with their Portal credentials.

Adding a service account for CI/CD

  1. A cluster administrator creates the service account in the target namespace.
  2. If the service account needs access to additional namespaces, the administrator configures the appropriate role bindings.

Isolating resources with namespaces

Administrators can create namespaces to dedicate resources to specific teams or workflows.
  1. Create the namespace.
  2. Assign nodes to the namespace. (Nodes cannot be shared across namespaces.)
  3. Add users or service accounts as subjects to the namespace’s role binding.

Modifying or revoking access

  • To change a user’s role or disable them: edit or disable their account in the MacStadium Customer Portal.
  • To revoke a service account’s access: delete the service account in the Orka cluster.
  • To add or remove namespace access: update the relevant role bindings in the cluster.

Key terms

TermWhereDefinition
AccountCustomer PortalThe top-level entity managing one or more Orka clusters. All account users are shared across clusters on the same account.
Account userCustomer PortalA person belonging to the account. Can assume one role: Admin, Tech, or Billing.
Cluster userOrka clusterA Portal account user who has logged in to the cluster. Maps to Administrator or Technical based on their Portal role.
Service accountOrka clusterA cluster-only account for CI/CD integrations. Not linked to a Portal account; tokens are valid for 1 year by default.
NamespaceOrka clusterIsolates resources (VMs, images, nodes) from other namespaces. Users and service accounts need explicit role binding access to each namespace.
RoleOrka clusterA Kubernetes RBAC role — Administrator or Technical. Created automatically when a namespace is created.
Role bindingOrka clusterLinks cluster users or service accounts to a namespace. Admins manage role binding subjects manually.