As a Service Registry instance owner or instance administrator, or as an organization administrator in the Red Hat Customer Portal, you can manage the level of access that other user accounts and service accounts have to your Service Registry instance. You can grant or remove access to your Service Registry instance for specific user accounts in your organization based on user roles. You can also allow other users or service accounts to manage the level of access to your instance for you.
Service Registry instance owners or instance administrators can manage access for only the Service Registry instances that they create or for instances that the owner has allowed them to access and change. Organization administrators can manage access for all Service Registry instances.
OpenShift Service Registry uses Role-Based Access Control (RBAC) to manage how other user accounts and service accounts access the Service Registry instances that you create and the artifacts that they contain. You can manage access for only the Service Registry instances that you create or for instances that the owner has allowed you to access and change.
An account in OpenShift Service Registry is either a user account or a service account. A user account enables users in your organization to access your Service Registry instances. A service account enables client applications or tools to connect securely to your Service Registry instances.
The Service Registry web console provides an Access tab on the Service Registry instance page. Service Registry instance owners, instance administrators, and organization administrators can use this tab to manage the following user roles:
- Administrator
-
Users with the Administrator role can perform the following tasks in this Service Registry instance:
-
View or write schema and API artifacts
-
Configure user roles for access
-
Configure Service Registry settings
-
Configure global rules for artifact compatibility and validity
-
Import or export Service Registry data
-
- Manager
-
Users with the Manager role can perform the following tasks in this Service Registry instance:
-
View or write schema and API artifacts
-
Configure content rules at the artifact level
-
- Viewer
-
Users with the Viewer role can view schema and API artifacts in this Service Registry instance.
Important
|
The owner of a Service Registry instance has the Administrator role for that instance by default, and can assign roles in the same organization. Other user accounts or service accounts in the organization have no access to that instance by default. |
You can use the web console, or the OpenShift Application Services CLI (rhoas
) commands, to manage user roles. The core Service Registry REST API also provides Admin API endpoints for managing user roles.
You can view the user roles assigned to your Service Registry instances to manage how other user accounts or service accounts interact with the instance and the artifacts that it contains. You can view user roles and accounts only for instances that you create or for instances that the owner has assigned you access to.
-
You’re logged in to the Service Registry web console at https://console.redhat.com/application-services/service-registry/.
-
The Service Registry instance is created and is in Ready state.
-
The user accounts or service accounts that you want to view are created in the organization and are assigned user roles.
-
In the Service Registry web console, click the name of the Service Registry instance that you want to view roles and accounts for.
-
Click the Access tab to view the roles and accounts assigned for this instance:
-
To view specific accounts, click Account, enter the user account or service account name, and click the search button.
-
To view accounts with a specific role, click Role, click Filter by role, and select the role you want (for example, Administrator), and then click the search button.
-
-
When you are finished, click Clear all filters.
In OpenShift Service Registry, you can assign user roles for your Service Registry instances to manage how other user accounts or service accounts interact with the instance and the artifacts that it contains. You can assign user roles only for instances that you create or for instances that the owner has assigned you access to.
-
You’re logged in to the Service Registry web console at https://console.redhat.com/application-services/service-registry/.
-
The Service Registry instance is created and is in Ready state.
-
The user accounts or service accounts that you’re assigning roles to are created in the organization.
-
In the Service Registry web console, click the name of the Service Registry instance that you want to assign roles for.
-
Click the Access tab to view the accounts and roles assigned for this instance.
-
Click Grant access to assign roles to accounts.
-
In the Account field, select or enter the service account or user account name that you want to assign the role to:
-
A service account enables your application or tool to connect securely to your instance.
-
A user account enables users in your organization to access instances.
NoteIf you don’t see users in the list, ask your organization administrator to grant access to view other user accounts. For more information, see Allowing users to view other user accounts.
-
-
Select the Role that you want to assign to your account, for example, Manager for write access to this instance.
-
Click Save.
You can edit or remove the user roles assigned in your Service Registry instances to manage how other user accounts or service accounts interact with the instance and the artifacts that it contains. You can edit or remove user roles only for the instances that you create or for instances that the owner has assigned you access to.
-
You’re logged in to the Service Registry web console at https://console.redhat.com/application-services/service-registry/.
-
The Service Registry instance is created and is in Ready state.
-
The user accounts or service accounts are created in the organization and the user roles are assigned.
-
In the Service Registry web console, click the name of the Service Registry instance that you want to remove a user role for.
-
Click the Access tab to view the accounts and roles assigned for this instance.
-
Click the options menu (three vertical dots) next to the assigned Role name:
-
To change to a different role, click Edit, select the new user role, for example, Viewer for read-only access, and then click Save.
-
To remove the currently assigned role, click Remove, and then click Remove again to confirm.
-
As an organization administrator, you can use Role-Based Access Control (RBAC) in the Application Services Hybrid Cloud Console to allow users to view other users in an organization.
You set up access by assigning a predefined role called User Access principal viewer
to a user group.
By assigning the role, users in the group can do the following tasks:
-
View and select other users when changing owners and managing access to Service Registry instances in the Service Registry web console.
-
Specify user names when managing Service Registry instances using the
rhoas
CLI for OpenShift Service Registry.
-
You’re logged in to the Service Registry web console at https://console.redhat.com/application-services/service-registry/ as an organization administrator.
-
A user group is created that contains the users to assign the role to.
Note
|
If you want to add the User Access principal viewer role to a single user, create a new group for that user only.
|
-
In the toolbar of the Service Registry web console, select the gear icon.
-
Click Identity & Access Management > User Access > Groups.
-
Click the name of the user group.
-
From the Roles tab, click Add role, and select
User Access principal viewer
. -
Click Add to group.
The role is also added to the list of selected roles on the Roles tab.