Authorization: Role-Based Access Control
RBAC simplifies the management of permissions by associating permissions with roles rather than with individual users. Users are assigned roles based on their job responsibilities, and these roles determine what actions they can perform and what resources they can access. This approach makes it easier to manage permissions, enforce policies, and maintain security as organizational roles and responsibilities change.
RBAC is an effective and scalable approach to managing user access within a system. By defining roles with specific permissions and assigning these roles to users, organizations can enhance security, simplify access management, and ensure that users only have the access they need for their job functions.
Explore further Kloudfuse documentation on RBAC:
Pillars of Role-Based Access Control
Kloudfuse recognizes and supports these primary pillars of RBAC:
Roles
- Definition
-
A role is a collection of permissions that define what actions a user can perform within a system.
- Examples
-
Common roles include Administrator, Editor, and Viewer. Each role has a specific set of permissions associated with it.
Specifically, the roles in the Kloudfuse platform have the following capabilities and associated permissions:
Domain | User Management | Kloudfuse R/W | *Grafana R/W | Data Access R |
---|---|---|---|---|
Capability |
|
|
|
|
Admin |
||||
Editor |
||||
Viewer |
||||
* Grafana is only visible to users with Admin role |
Permissions
- Definition
-
Permissions are the rights or privileges granted to perform certain actions or access specific resources.
- Examples
-
Permissions might include read, write, delete, or execute rights on dashboards and alerts, or access to specific applications and data.
Users
- Definition
-
Users are individuals who interact with the system. Each user is assigned a role based on their job function and needs.
- Examples
-
An Admin or SRE may be assigned roles that grant access to a specific namespace, folder, dashboards, or alerts.
Role Assignments
- Definition
-
Role assignments involve linking users to specific roles. This mapping determines what roles a user holds and, consequently, what permissions they have.
- Examples
-
Assigning a user the role of "Administrator" grants them access to all administrative functions, whereas assigning them the role of "Viewer" restricts them to only seeing traces.
Other Important Concepts in RBAC
In addition to the Pillars, Kloudfuse supports the following concepts in RBAC:
Separation of Duties (SoD)
- Definition
-
SoD is a principle to ensure that no single role has enough permissions to misuse the system or commit fraud. It helps in preventing conflicts of interest.
- Examples
-
The role responsible for approving payments should not be the same role that processes payments.
Benefits of RBAC
Using RBAC in your suite of observability tools provides significant benefits:
Simplified Management
By grouping permissions into roles, RBAC simplifies the process of managing and auditing access controls, especially in large organizations.
RBAC Use Cases
Kloudfuse enables your organization to realize these important functions:
Allow certain users to only read level access for all objects
This can be set at the level of a user or group, by assigning the Viewer role.
Allow certain users read-write access to all objects
This can be set at the level of the user or group, by assigning Editor or Admin role.