Skip to main content
Version: 0.36.0

Authorization Enterprise

This section provides a recommended way to configure RBAC in the context of policies. It is oriented to the journey that you expect your users to have.

View Resources

The policy journey in the UI involves several resources. We have the Policies that are used by the agent, the resulting Violations when the agent enforces those policies, and the PolicyConfigs that the user can configure to override policy parameters. The violations are essentially kubernetes events that contain the Validation object.

In order to view those resources, users would need to have read access to the policies, policysconfigs, and events resource.

An example of a configuration to achieve this purpose could be seen below with policies-reader role and developer-policies-reader cluster role binding, to allow a group developer to access all the policy-related resources.

apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: policies-reader
rules:
- apiGroups: ["pac.weave.works"]
resources: ["policies", "policyconfigs"]
verbs: ["get", "list", "watch"]
- apiGroups: [""]
resources: ["events"]
verbs: ["get", "watch", "list"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: developer-policies-reader
subjects:
- kind: Group
name: developer
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole
name: policies-reader
apiGroup: rbac.authorization.k8s.io