-
Story
-
Resolution: Done
-
Normal
-
None
-
False
-
-
False
-
-
Unset
-
CRCPLAN-185 - RBAC | Support Service Account Auth in Console RBAC
-
No
-
-
-
Access & Management Sprint 83, Access & Management Sprint 84, Access & Management Sprint 85, Access & Management Sprint 86
I've noticed that I'm not able to manage RBAC (for example add user to a group) through my service account even if the service account has the "User Access administrator" role:
$ curl -sSH "Authorization:Bearer ${access_token}" "https://console.redhat.com/api/rbac/v1/access/?application=rbac" | jq{ "meta": { "count": 2, "limit": 2, "offset": 0 }, "links": { "first": "/api/rbac/v1/access/?application=rbac&limit=2&offset=0", "next": null, "previous": null, "last": "/api/rbac/v1/access/?application=rbac&limit=2&offset=0" }, "data": [ { "resourceDefinitions": [], "permission": "rbac:principal:read" }, { "resourceDefinitions": [], "permission": "rbac:*:*" } ] } $ curl -X "POST" -sSH "Authorization:Bearer ${access_token}" -H 'accept: application/json' -H 'Content-Type: application/json' -d '{ "principals": [ { "clientID": "ff9e3515-08e8-4a26-bb64-dd356a7b8207", "type": "service-account" } ] }' 'https://console.redhat.com/api/rbac/v1/groups/aab022d1-093d-47cb-a1c0-26aad06e305f/principals/' {"errors":[{"detail":"Non-admin users may not add principals to Groups with RBAC permissions.","source":"add_principals","status":"400"}]}
chambrid : "Worth revisiting the use case with PM. I can see customers wanting to build tooling to add/remove users from different groups depending upon organizational changes. I had planned to do something similar with the service account to allow AppSRE to control tenant access to different functionality."
Related slack thread: https://redhat-internal.slack.com/archives/C0233N2MBU6/p1707818851033319
- causes
-
RHCLOUD-30043 [RBAC] Service account with User Access Administrator is denied from gathering other principals permissions
- Closed
- relates to
-
RHCLOUD-30637 Non-admin user has access to RBAC Groups
- Closed