User management
You can manage users in the Cloudfleet console. To access the user management page, navigate to the user management page.
You can invite your team members to your organization by entering their email addresses. You can also assign roles to users to control their access to your organization’s resources. For organizations requiring two-factor authentication (2FA) or centralized identity management, see Single Sign-On (SSO).
CFKE Security Model and Cloudfleet Roles
Cloudfleet provides two primitive roles to manage access to your organization’s resources:
- Administrator
- User
Administrators have full access to all resources in your organization. They can create and manage clusters, manage users, and manage API tokens, manage billing.
Users have limited access to your organization’s resources. They can only connect to clusters.
CFKE have full support for Kubernetes RBAC. When you create a user and grant them Administrator or User role on Cloudfleet, this is translated in the Kubernetes as cluster-admin and view roles respectively.
After granting view baseline role to a user, you can elevate this user’s permissions by granting additional roles in the Kubernetes RBAC.
Granting additional permissions with Kubernetes RBAC
Users with the User role receive baseline view permissions across the cluster. To grant a user elevated permissions in a specific namespace, create a RoleBinding that maps their identity to a Kubernetes role.
For example, to grant a user edit permissions in the development namespace:
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: developer-edit-binding
namespace: development
subjects:
- kind: User
name: [email protected] # The user's email address
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole
name: edit # Built-in Kubernetes role with read/write access
apiGroup: rbac.authorization.k8s.io
To grant the same permissions to all users in your organization, use a Group binding instead:
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: team-edit-binding
namespace: development
subjects:
- kind: Group
name: system:authenticated # All authenticated users
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole
name: edit
apiGroup: rbac.authorization.k8s.io
Common built-in ClusterRoles you can reference:
view: Read-only access to most resourcesedit: Read/write access to most resources in a namespaceadmin: Full access within a namespace, including RBACcluster-admin: Full access to all resources (use with caution)
For more details on Kubernetes RBAC, see the Kubernetes RBAC documentation.
Invite a user
- Navigate to the user management page.
- Click the
Invitebutton. - Enter the email address of the user you want to invite.
- Click the
Invitebutton.
The user will receive an email invitation to join your organization. Once they accept the invitation, they will be able to access your organization’s resources. New users are assigned the User role by default.
API tokens →