Understanding RBAC in Orka
Orka relies on RBAC (role-based access control) for the management of user access to resources. In Orka, RBAC consists of the following elements:- Roles: A set of permissions. Roles are managed by MacStadium.
- Subjects: Users and service accounts which can be bound to a role. Subjects are managed by Orka users with administrative privileges.
- Namespaces: Groups of resources dedicated to specific users or service accounts. Namespaces are managed by Orka users with administrative privileges.
- Rolebindings: K8s objects describing which subjects belong to which role and which subjects can access which namespaces. Rolebindings are managed by Orka users with administrative privileges.
- All admin users have access to all namespaces
- All non-admin users have user access to the
orka-defaultnamespace
- To grant a user access to a specific namespace, add that user as a subject to the rolebinding for the namespace
- Service accounts automatically have access to the namespace where they were created
- To grant a service account access to a specific namespace, add that service account as a subject to the rolebinding for the namespace
--namespace is not set, rolebinding commands operate in the orka-default namespace. The shorthand alias for rolebinding is rb.
Managing Rolebindings
orka3 rolebinding add-subject Add a subject to the rolebinding for the specified namespace. This grants the user or the service account access to the specified namespace. Syntax:Adding and Removing Access
Common Workflow:- Create a namespace:
- Move nodes to the namespace:
- Grant users access:
- Grant service accounts access:
- Verify access: