Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add RBAC enhancement documentation to NeuVector integration docs. #4280

Open
wants to merge 5 commits into
base: master
Choose a base branch
from

Conversation

horantj
Copy link

@horantj horantj commented Aug 26, 2022

Per customer request, we have documented the necessary permissions within Rancher that will enable users to log in to NeuVector using the ranchersso functionality.

This has been tested at project and cluster level, using built in users and github groups.


This article is intended for users who need to provide access to the NeuVector app deployed via the Rancher app catalog with the Rancher chart. This will not work on deployments using the partner chart.

By default, a Rancher cluster admin and a global admin will automatically be mapped to be global admins within NeuVector. In order to map other personas, some access will need to be provided to the Rancher user/group depending on the desired access within NeuVector. Please note that adding the below permissions will not provide access to any Kubernetes resources beyond what is already given by existing Rancher roles, with one exception: the NeuVector service proxy.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please note that adding the below permissions will not provide access to any Kubernetes resources beyond what is already given by existing Rancher roles, with one exception: the NeuVector service proxy.

I still don't think this is accurate. If I'm a project member who only has access to my single custom project, and then you give me NV admin permissions, I can now see many things I couldn't see before. I just have to click on Network activity and now I have indirect GET/LIST access on all sorts of things: cattle-cluster-agent, fleet-agent, node information, ingress information, traffic flow between them etc... I don't have the raw k8s RBAC to get that info directly from the API server, but I've just used the NV service-account to proxy that information for me. Once you get into policy stuff you can go beyond Get/List and into Create/Update.

@@ -181,8 +181,6 @@ kubectl patch cronjob neuvector-updater-pod -n cattle-neuvector-system --patch '

### Support Limitations

* Only admins and cluster owners are currently supported.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Even with below solution I think this part is accurate. We don't support 1:1 mapping of project-members, project-owners, or cluster-members.

@anupama2501
Copy link

@horantj we[rancherqa] haven't validated this. could you link any ticket if we have for these tests?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants