docs/doc/source/security/kubernetes/configure-users-groups-and-authorization.rst
Keane Lim 3c5fa979a4 Security guide update
Re-organized topic hierarchy

Tiny edit to restart review workflow.

Squashed with Resolved index.rst conflict commit

Change-Id: I13472792cb19d1e9975ac76c6954d38054d606c5
Signed-off-by: Keane Lim <keane.lim@windriver.com>
Signed-off-by: MCamp859 <maryx.camp@intel.com>
2021-03-12 15:10:40 -05:00

2.3 KiB

Configure Users, Groups, and Authorization

You can create a user, and optionally one or more groups that the user is a member of, in your Windows Active Directory server.

The example below is for a testuser user who is a member of the, billingDeptGroup, and managerGroup groups. See Microsoft documentation on Windows Active Directory <https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/get-started/vi rtual-dc/active-directory-domain-services-overview>__ for additional information on adding users and groups to Windows Active Directory.

Use the following procedure to configure the desired authorization on for the user or the user's group(s):

  1. In , bind Kubernetes role(s) for the testuser.

    For example, give testuser admin privileges, by creating the following deployment file, and deploy the file with kubectl apply -f <filename>.

    kind: ClusterRoleBinding
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
     name: testuser-rolebinding
    roleRef:
     apiGroup: rbac.authorization.k8s.io
     kind: ClusterRole
     name: cluster-admin
    subjects:
    - apiGroup: rbac.authorization.k8s.io
      kind: User
      name: testuser

    Alternatively, you can bind Kubernetes role(s) for the group(s) of the testuser.

    For example, give all members of the billingDeptGroup admin privileges, by creating the following deployment file, and deploy the file with kubectl apply -f <filename>.

    kind: ClusterRoleBinding
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
     name: testuser-rolebinding
    roleRef:
     apiGroup: rbac.authorization.k8s.io
     kind: ClusterRole
     name: cluster-admin
    subjects:
    - apiGroup: rbac.authorization.k8s.io
      kind: Group
      name: billingDeptGroup