Chapter 17. Inviting users to your RHACS instance


By inviting users to Red Hat Advanced Cluster Security for Kubernetes (RHACS), you can ensure that the right users have the appropriate access rights within your cluster. You can invite one or more users by assigning roles and defining the authentication provider.

17.1. Configuring access control and sending invitations

By configuring access control in the RHACS portal, you can invite users to your RHACS instance.

Procedure

  1. In the RHACS portal, go to the Platform Configuration Access Control Auth providers tab, and then click Invite users.
  2. In the Invite users dialog box, provide the following information:

    • Emails to invite: Enter one or more email addresses of the users you want to invite. Ensure that they are valid email addresses associated with the intended recipients.
    • Provider: From the drop-down list, select a provider you want to use for each invited user.

      Important
      • If you have only one authentication provider available, it is selected by default.
      • If multiple authentication providers are available and at least one of them is Red Hat SSO or Default Internal SSO, that provider is selected by default.
      • If multiple authentication providers are available, but none of them is Red Hat SSO or Default Internal SSO, you are prompted to select one manually.
      • If you have not yet set up an authentication provider, a warning message appears and the form is disabled. Click the link, which takes you to the Access Control section to configure an authentication provider.
    • Role: From the drop-down list, select the role to assign to each invited user.
  3. Click Invite users.
  4. On the confirmation dialog box, you receive a confirmation that the users have been created with the selected role.
  5. Copy the one or more email addresses and the message into an email that you create in your own email client, and send it to the users.
  6. Click Done.

Verification

  1. In the RHACS portal, go to the Platform Configuration Access Control Auth providers tab.
  2. Select the authentication provider you used to invite users.
  3. Scroll down to the Rules section.
  4. Verify that the user emails and authentication provider roles have been added to the list.
Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.