Cluster Access Management: Overview

Overview of the updated cluster access management, introduced with Orka 3.0

🚧

Quick navigation

Jump to: Terminology | Role-based access matrix| Workflow overview

Starting with Orka 3.0, Orka relies on Single-Sign On (SSO) and the Kubernetes concept of role-based access control (RBAC) for user management.

Users log in to their cluster with their MacStadium Customer Portal credentials. Based on the role bindings configured for the respective user, they can access one or more namespaces.

Terminology

DomainTermDefinition
Customer PortalAccountThe account managing one or more Orka clusters in the MacStadium Customer Portal. Every account has a unique ID in the Customer Portal. One account might have multiple account users in various account roles.

If one Customer Portal account manages multiple Orka clusters, all account users are shared between the clusters.
Customer PortalAccount userA user belonging to the managing account in the MacStadium Customer Portal. One Customer Portal account user can assume only one account role at a time.

If one Customer Portal account manages multiple Orka clusters, all account users are shared between the clusters.

Any account user can log in to the Orka cluster belonging to the account. Only Admin and Tech users can work with the cluster.
Customer PortalAccount roleAn account user can assume only one of the following account roles at a time: Admin, Billing, or Tech. Account users with the Admin role are also administrators for the Orka cluster. Account users with the Tech role are considered developers and have non-administrative access to the Orka cluster. Account users with the Billing role can only log in to the cluster but cannot perform any actions.
Orka clusterCluster userA Customer Portal account user logged in to the Orka cluster. Based on their account role, they belong to the Administrator or the Technical role.

If one Customer Portal account manages multiple Orka clusters, all account users are shared between the clusters.
Orka clusterService accountA special type of Orka cluster account intended for use with the available Orka CI/CD integrations. A service account is not related to a Customer Portal account and cannot be shared across clusters.
Orka clusterNamespaceA namespace is a way to isolate resources and dedicate them to a specific user, group of users, or service account(s). For a user or a service account to be able to access the namespace, they must be added as a subject to the respective role binding. Role bindings are created automatically, but administrators need to add subjects manually.
Orka clusterRoleA Kubernetes RBAC role for your Orka cluster. The two default roles: Administrator and Technical correspond directly to the Admin and Tech account roles.

When an administrator creates a new namespace, Orka automatically creates a predefined role for the namespace. You can control which cluster users and service accounts can access the namespace by adding or removing subjects to the respective role binding.
Orka clusterRole bindings and subjectsA way to indicate which cluster users have access to which namespaces. By default, all Administrator and Tech users can access the orka-default namespace. All Administrators can access all custom orka- namespaces. Tech users have access to a custom namespace when they are added as a subject to the respective role binding.

Role-based access matrix

The Admin account role maps to the Administrator group role in the Orka cluster.

The Tech account role maps to the Technical group role in the Orka cluster.

The Billing account role does not map to any role in the Orka cluster.

Cluster service accounts don't map to any account roles.

Within the Customer Portal, the Admin, Tech, and Billing roles have the following capabilities:

Within the Orka cluster, the Admin, Tech, and Billing roles have the following capabilities:

OperationAdminTechBillingAdmin SA
(Orka Small
Teams-only)
Regular SA
Log in with CP credentialsβœ…βœ…βœ…βŒβŒ
Log in with authentication tokenβœ…βœ…βŒβœ…βœ…
Log outβœ…βœ…βœ…βœ…βœ…
Manage usersβœ…βŒβŒβŒβŒ
Manage service accounts,
including token generation
βœ…βŒβŒβœ…βŒ
Print authentication tokenβœ…βœ…βœ…βœ…βœ…
Manage namespacesβœ…βŒβŒβœ…βŒ
Manage role bindingsβœ…βŒβŒβœ…βŒ
List nodesβœ…βœ…βŒβœ…βœ…
Manage nodesβœ…βŒβŒβœ…βŒ
Access and work in the orka-default namespaceβœ…By default, yes.
An administrator
can revoke access
to orka-default.
βŒβœ…Yes,
if created in the orka-default
namespace.
Otherwise, based on
role bindings.
Access and work in custom orka- namespacesβœ…Based on
role bindings.
βŒβœ…Yes,
if created in the respective
namespace.
Otherwise, based on
role bindings.
View information about all VMs in the namespaceβœ…βœ…βŒβœ…βœ…
Deploy VMs in the namespaceβœ…βœ…βŒβœ…βœ…
Manage the VM state of all VMs in the namespaceβœ…βœ…βŒβœ…βœ…
Delete own VMs in the namespaceβœ…βœ…βŒβœ…βœ…
Delete other subjects' VMs in the namespaceβœ…βŒβŒβœ…βŒ
Manage VM configs (except deleting)βœ…βœ…βŒβœ…βœ…
Delete own VM configsβœ…βœ…βŒβœ…βœ…
Delete other owners' VMsβœ…βŒβŒβœ…βŒ
Manage imagesβœ…βœ…βŒβœ…βœ…
List and pull remote imagesβœ…βœ…βŒβœ…βœ…
Manage ISOsβœ…βœ…βŒβœ…βœ…
List and pull remote ISOsβœ…βœ…βŒβœ…βœ…

Workflow overview

The following workflow outlines how to add users to the cluster.

  1. In the MacStadium Customer Portal, an account administrator invites the account users who need to be able to access the Orka cluster and sets their roles.
  2. The invited account users accept the invite and update their temporary credentials in the MacStadium Customer Portal.
  3. The account users log in to the Orka cluster with their Customer Portal credentials.

The following workflow outlines how to add service accounts to the cluster.

  1. In the Orka cluster, an administrator creates the service account to target a specific namespace.
  2. If needed, the cluster administrator provides additional namespace access to the service account.

Next, administrators can choose to isolate and dedicate resources to specific users and service accounts. This way, administrators can structure their clusters around teams and/or workflows.

  1. The cluster administrator creates a namespace.
  2. The cluster administrator assigns nodes to the namespace. (Nodes cannot be shared across namespaces and clusters.)
  3. The cluster administrator adds subjects to the respective role binding for the namespace. Any service accounts need to already exist. Any users need to already be part of the Customer Portal account.

If needed, an administrator can change the details or role of a user, or revoke the access of a user or a service account to the cluster.

  • In the MacStadium Customer Portal, an account administrator edits or disables users.
  • In the Orka cluster, a cluster administrator deletes service accounts.

If needed, an administrator can move unused resources (nodes) across namespaces.

If needed, an administrator can revoke the access to a namespace or provide additional namespace access to existing users and service accounts.

  • In the Orka cluster, an administrator adds or removes subjects to the respective role bindings.

See also


Β© 2019-2023 Copyright MacStadium, Inc. – Documentation built with readme.com. Orka is a registered trademark of MacStadium, Inc.