Skip to content

Users

Within KubDash, each person authenticates as a user, which is a login that grants you access to KubDash. As mentioned in Authentication, users can either be local or external.

Manage User Roles

KuDash enables a super-easy and user-friendly RBAC management for users in Kubernetes. If you are looking for a simple and intuitive way of managing your users within a Kubernetes cluster, this is the right place.

With KuDash, you can create users, assign namespaces/permissions, via a nice and easy web UI.

Kubernetes Roles and Role bindings

Manage Group Roles

KuDash automatically creates groups from SSO login information. You can map this groups with Role templates.

Kubernetes Roles and Role bindings

Edit Kubernetes Roles and Role bindings

KuDash enables a super-easy and user-friendly RBAC management for Kubernetes. If you are looking for a simple and intuitive way of managing your users within a Kubernetes cluster, this is the right place.

With KuDash, you can create users, assign namespaces/permissions, and distribute Kubeconfig YAML files via a nice and easy web UI.

Kubernetes Roles and Role bindings

The application allows us to define and select permission-templates and associate them with all the users you might want to create. This configuration can be applied, within a namespace or globally. The template system is an abstraction over Cluster-Roles, RoleBinding, and ClusterRolesBindigs. A template is a ClusterRole with a prefix template-namespaced-resources--- for example template-namespaced-resources---developer

The fallowing ClusterRoles are the default templates:

  • template-cluster-resources—--admin - Custer Admin privilege to use in cluster role bindings.
  • template-cluster-resources—--reader - Cluster Read only privilege to use in cluster role bindings.
  • template-namespaced-resources—--deployer - Deployer privilege for technical users to use in cluster role bindings.
  • template-namespaced-resources—--developer - Developer privilege for developers to use in role bindings.
  • template-namespaced-resources—--operation - Namespace Admin privilege to use in role bindings.

You can create your own templates by creating a clusterRole starting with the template-namespaced-resources--- prefix. KubeDash will automatically detect your custom templates.