You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/vshn-managed/keycloak/security.adoc
+32-1Lines changed: 32 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -23,4 +23,35 @@ spec:
23
23
----
24
24
25
25
<1> List of namespaces to be allowed to access Keycloak
26
-
<2> Allows access to Keycloak from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
26
+
<2> Allows access to Keycloak from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
27
+
28
+
== Namespace RBAC
29
+
30
+
On APPUiO Cloud, every member of the same organization to which the claim namespace belongs to has limited access to the namespace for debugging and port-fowarding.
31
+
32
+
On APPUiO Managed, we don't have this construct and no RBAC rules are deployed by default.
33
+
34
+
However, it is possible to specify a list of `Groups` or `Users`that should have that limited access to the namespace.
35
+
This can be done using the two fields `allowedGroups` and `allowedUsers`:
36
+
37
+
[source,yaml]
38
+
----
39
+
apiVersion: vshn.appcat.vshn.io/v1
40
+
kind: VSHNKeycloak
41
+
metadata:
42
+
name: keycloak-app1-prod
43
+
namespace: prod-app
44
+
spec:
45
+
parameters:
46
+
security:
47
+
allowedGroups: # <1>
48
+
- my-dev-engineers
49
+
- my-support-engineers
50
+
allowedGroups: # <2>
51
+
- my-special-user
52
+
writeConnectionSecretToRef:
53
+
name: keycloak-creds-connection
54
+
----
55
+
56
+
<1> List of groups to be allowed limited access to the Keycloak namespace
57
+
<2> List of users to be allowed limited access to the Keycloak namespace
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/vshn-managed/mariadb/security.adoc
+32-1Lines changed: 32 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -23,4 +23,35 @@ spec:
23
23
----
24
24
25
25
<1> List of namespaces to be allowed to access MariaDB
26
-
<2> Allows access to MariaDB from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
26
+
<2> Allows access to MariaDB from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
27
+
28
+
== Namespace RBAC
29
+
30
+
On APPUiO Cloud, every member of the same organization to which the claim namespace belongs to has limited access to the namespace for debugging and port-fowarding.
31
+
32
+
On APPUiO Managed, we don't have this construct and no RBAC rules are deployed by default.
33
+
34
+
However, it is possible to specify a list of `Groups` or `Users`that should have that limited access to the namespace.
35
+
This can be done using the two fields `allowedGroups` and `allowedUsers`:
36
+
37
+
[source,yaml]
38
+
----
39
+
apiVersion: vshn.appcat.vshn.io/v1
40
+
kind: VSHNMariaDB
41
+
metadata:
42
+
name: mariadb-app1-prod
43
+
namespace: prod-app
44
+
spec:
45
+
parameters:
46
+
security:
47
+
allowedGroups: # <1>
48
+
- my-dev-engineers
49
+
- my-support-engineers
50
+
allowedGroups: # <2>
51
+
- my-special-user
52
+
writeConnectionSecretToRef:
53
+
name: mariadb-creds-connection
54
+
----
55
+
56
+
<1> List of groups to be allowed limited access to the MariaDB namespace
57
+
<2> List of users to be allowed limited access to the MariaDB namespace
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/vshn-managed/nextcloud/security.adoc
+33-2Lines changed: 33 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ To access Nextcloud from other namespaces the service must be configured.
8
8
[source,yaml]
9
9
----
10
10
apiVersion: vshn.appcat.vshn.io/v1
11
-
kind: VSHNKNextcloud
11
+
kind: VSHNNextcloud
12
12
metadata:
13
13
name: nextcloud-app1-prod
14
14
namespace: prod-app
@@ -23,4 +23,35 @@ spec:
23
23
----
24
24
25
25
<1> List of namespaces to be allowed to access Nextcloud
26
-
<2> Allows access to Nextcloud from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
26
+
<2> Allows access to Nextcloud from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
27
+
28
+
== Namespace RBAC
29
+
30
+
On APPUiO Cloud, every member of the same organization to which the claim namespace belongs to has limited access to the namespace for debugging and port-fowarding.
31
+
32
+
On APPUiO Managed, we don't have this construct and no RBAC rules are deployed by default.
33
+
34
+
However, it is possible to specify a list of `Groups` or `Users`that should have that limited access to the namespace.
35
+
This can be done using the two fields `allowedGroups` and `allowedUsers`:
36
+
37
+
[source,yaml]
38
+
----
39
+
apiVersion: vshn.appcat.vshn.io/v1
40
+
kind: VSHNNextcloud
41
+
metadata:
42
+
name: nextcloud-app1-prod
43
+
namespace: prod-app
44
+
spec:
45
+
parameters:
46
+
security:
47
+
allowedGroups: # <1>
48
+
- my-dev-engineers
49
+
- my-support-engineers
50
+
allowedGroups: # <2>
51
+
- my-special-user
52
+
writeConnectionSecretToRef:
53
+
name: nextcloud-creds-connection
54
+
----
55
+
56
+
<1> List of groups to be allowed limited access to the Nextcloud namespace
57
+
<2> List of users to be allowed limited access to the Nextcloud namespace
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/vshn-managed/postgresql/security.adoc
+32-1Lines changed: 32 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -23,4 +23,35 @@ spec:
23
23
----
24
24
25
25
<1> List of namespaces to be allowed to access PostgreSQL
26
-
<2> Allows access to PostgreSQL from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
26
+
<2> Allows access to PostgreSQL from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
27
+
28
+
== Namespace RBAC
29
+
30
+
On APPUiO Cloud, every member of the same organization to which the claim namespace belongs to has limited access to the namespace for debugging and port-fowarding.
31
+
32
+
On APPUiO Managed, we don't have this construct and no RBAC rules are deployed by default.
33
+
34
+
However, it is possible to specify a list of `Groups` or `Users`that should have that limited access to the namespace.
35
+
This can be done using the two fields `allowedGroups` and `allowedUsers`:
36
+
37
+
[source,yaml]
38
+
----
39
+
apiVersion: vshn.appcat.vshn.io/v1
40
+
kind: VSHNPostgreSQL
41
+
metadata:
42
+
name: postgres-app1-prod
43
+
namespace: prod-app
44
+
spec:
45
+
parameters:
46
+
security:
47
+
allowedGroups: # <1>
48
+
- my-dev-engineers
49
+
- my-support-engineers
50
+
allowedGroups: # <2>
51
+
- my-special-user
52
+
writeConnectionSecretToRef:
53
+
name: postgres-creds-connection
54
+
----
55
+
56
+
<1> List of groups to be allowed limited access to the PostgreSQL namespace
57
+
<2> List of users to be allowed limited access to the PostgreSQL namespace
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/vshn-managed/redis/security.adoc
+32-1Lines changed: 32 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -23,4 +23,35 @@ spec:
23
23
----
24
24
25
25
<1> List of namespaces to be allowed to access Redis
26
-
<2> Allows access to Redis from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
26
+
<2> Allows access to Redis from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
27
+
28
+
== Namespace RBAC
29
+
30
+
On APPUiO Cloud, every member of the same organization to which the claim namespace belongs to has limited access to the namespace for debugging and port-fowarding.
31
+
32
+
On APPUiO Managed, we don't have this construct and no RBAC rules are deployed by default.
33
+
34
+
However, it is possible to specify a list of `Groups` or `Users`that should have that limited access to the namespace.
35
+
This can be done using the two fields `allowedGroups` and `allowedUsers`:
36
+
37
+
[source,yaml]
38
+
----
39
+
apiVersion: vshn.appcat.vshn.io/v1
40
+
kind: VSHNRedis
41
+
metadata:
42
+
name: redis-app1-prod
43
+
namespace: prod-app
44
+
spec:
45
+
parameters:
46
+
security:
47
+
allowedGroups: # <1>
48
+
- my-dev-engineers
49
+
- my-support-engineers
50
+
allowedGroups: # <2>
51
+
- my-special-user
52
+
writeConnectionSecretToRef:
53
+
name: redis-creds-connection
54
+
----
55
+
56
+
<1> List of groups to be allowed limited access to the Redis namespace
57
+
<2> List of users to be allowed limited access to the Redis namespace
0 commit comments