To restrict user access through the access control system, a user must have a defined role. This role must be associated with resources and authorized actions for the resource.
Roles are equivalent to group names, which are defined in the security provider server. In the access control process, the security provider server determines if the user belongs to a particular group. If so, the group is considered to be his or her role, and limits the available resources and actions the user can access.
There is also the option of the *any role, which implies that everyone is part of the role. If the *any role is used, no call is made to the security provider server to check whether the user is part of the role.
The *any option can also be used as part of the resources. It refers to all the resources in the cluster. You cannot define the *any resource option in a granular fashion, such as workspace1/*any.
Action Type | Description |
---|---|
READ | Ability to open, get, and subscribe to a specific resource, but not make any changes. |
WRITE | Ability to write, add, remove, and update a specific resource. |
START | Ability to start a project. |
STOP | Ability to stop a project or node. |
When the client makes a login call, the security services authenticate the user. When a user of Role A tries to access Resource B, verification ensures the user is authorized to access the resource and perform the desired action on the resource.