14.6. User Authorization
14.6.1. User Authorization Model Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Red Hat Enterprise Virtualization applies authorization controls based on the combination of the three components:
- The user performing the action
- The type of action being performed
- The object on which the action is being performed
14.6.2. User Actions Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
For an action to be successfully performed, the
user
must have the appropriate permission
for the object
being acted upon. Each type of action corresponds to a permission
. There are many different permissions in the system, so for simplicity:
Figure 14.3. Actions
Important
Some actions are performed on more than one object. For example, copying a template to another storage domain will impact both the template and the destination storage domain. The user performing an action must have appropriate permissions for all objects the action impacts.