User management
Use the role-based user restrictions and user management capabilities to administer IBM Fusion HCI.
kubeadmin
, which is the default user for both. To authenticate the default user
login, use the password that got generated during the installation of IBM Fusion HCI.cluster-admin
role and delete the default kubeadmin
user.
For more information about roles, see OpenShift Container Platform documentation at Default cluster roles.
User roles
Role | Permissions |
---|---|
cluster-admin |
A super-user that can do any action in any project. When bound to a user with a local binding, they have full control over quota and every action on every resource in the project. |
view |
A user who cannot do any modifications, but can see most of the objects in a project. They cannot view or modify roles or bindings. |
You can create more users and user groups. You can also update or delete existing users by using
the cluster-admin
user roles.
Add user to a role
- Step 1: Get user and their role details:
- To get all users and their cluster wide roles, run the following command:
Alternatively, you can run the following commands:oc get clusterrolebindings -o json | jq -r '.items[] | {role: .roleRef.name, users: .subjects[]?.name} | select(.users != null)'
- Find all Users with a specific role:
For example, you want the list of all users in cluster-admin role:oc get clusterrolebindings -o json | jq -r '.items[] | select(.roleRef.name == "<role>") | {role: .roleRef.name, users: .subjects[]?.name}'
Example output:oc get clusterrolebindings -o json | jq -r '.items[] | select(.roleRef.name == "cluster-admin") | {role: .roleRef.name, users: .subjects[]?.name}'
{ “role”: “cluster-admin”, “user”: “ft-admin” } { “role”: “cluster-admin”, “user”: “openshift-apiserver-operator” } { “role”: “cluster-admin”, “user”: “openshift-config-operator” }{ “role”: “cluster-admin”, “user”: “service-ca-operator” }
- Find a specific user role in a cluster:
For example, you want to find the role of ft-admin in a cluster:oc get clusterrolebindings -o json | jq -r '.items[] | select(.subjects[]?.name == "<username>") | {role: .roleRef.name, user: "<username>"}'
Example response:oc get clusterrolebindings -o json | jq -r '.items[] | select(.subjects[]?.name == "ft-admin") | {role: .roleRef.name, user: "ft-admin"}'
{ “role”: “cluster-admin”, “user”: “ft-admin” }
- Find all Users with a specific role:
- Step 2: Add user to a role:
- Add user to cluster-admin role:
For example, add sf-admin user to cluster-admin role:oc adm policy add-cluster-role-to-user cluster-admin <username>
Add user to view role:oc adm policy add-cluster-role-to-user cluster-admin sf-admin
For example, add sf-usr user to view role:oc adm policy add-cluster-role-to-user view <username>
oc adm policy add-cluster-role-to-user view sf-usr
To know more about OpenShift Container Platform RBAC, see Using RBAC to define and apply permissions.
For more information about authentication and authorization, see OpenShift Container Platform documentation at Understanding authentication.
RBAC permissions for IBM Fusion HCI user interface
User interface page or menu option | Cluster-admin | View user |
---|---|---|
Events |
|
|
Applications |
|
|
Backup policies |
|
|
Backup policies | ||
page |
|
|
page |
|
|
page. |
|
|
page. |
|
|
From the title bar, click the help icon and select Collect support logs. |
|
|
App Switcher icon in title bar > Storage outbound arrow |
|
|
Disaster recovery |
|
|
Services |
|
|
Applications icon in title bar >OpenShift outbound arrow | For more information about the permissions of the role, see Using RBAC to define and apply permissions. Note: Menu option
is available to navigate to OpenShift
console with same login credentials.
|
Configure identity providers
- Step 1: Configure identify providers
-
- LDAP
Configure your organizations LDAP with OpenShift to access IBM Fusion HCI user interface. For the more information and procedure, see Configuring an LDAP identity provider.
- httpasswd
Configure httpassword identity provider to create users that can access OpenShift and IBM Fusion HCI user interface. To configure the user with httpasswd identity provider, see https://docs.openshift.com/container-platform/4.15/authentication/identity_providers/configuring-htpasswd-identity-provider.html.
- LDAP
- Step 2: Bind your user to a role or to a group.
- The user or group can have
cluster-admin
orview
roles.
- Step 3: Log in to IBM Fusion HCI user interface
- Log in to IBM Fusion HCI user interface by using the newly created or added user.