Text Blame History Raw

Configure default permission for ACO users

By default, all users which are authenticated with Openshift (system:authenticated) will be apart of the group self-provisioners. This role provides the basic access to create projects etc, where the user then has admin access within.

To prevent this, we must first delete this self-provisioner ClusterRoleBinding. Should we ever wish to restore for whatever reason, see the following which is the original contents of the object:

kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
  name: self-provisioners
  annotations:
    rbac.authorization.kubernetes.io/autoupdate: 'true'
subjects:
  - kind: Group
    apiGroup: rbac.authorization.k8s.io
    name: 'system:authenticated:oauth'
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: self-provisioner

Once removed, a new user which authenticates via ACO, now no longer has permission to do much of anything, beyond what a basic-user role provides.

To find this role originally, see resources [1][2]. To list the cluster roles and their bindings do the following oc describe clusterrole.rbac and oc describe clusterrolebinding.rbac. Searching for system:authenticated pointed toward which role was being automatically applied to the users which were authenticated with the cluster.

Adding permissions to an authenticated user

We first create a group which will contain all the users for a particular proejct. eg:

kind: Group
apiVersion: user.openshift.io/v1
metadata:
  name: project-group-admins
users:
  - user2
  - user1

Then create a project/namespace for the project. eg: oc create namespace "project"

Next create a rolebinding for the group to a role. We want to give members of this group, admin access within the namespace. eg:

kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
  name: project-admins
  namespace: project
subjects:
  - kind: Group
    apiGroup: rbac.authorization.k8s.io
    name: project-group-admins
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: admin

Users listed in the group will now have admin access to the project/namespace and nothing else within the cluster, which is what we want.

Resources