Este contenido no está disponible en el idioma seleccionado.

Chapter 7. Permission policies reference


Permission policies in Red Hat Developer Hub are a set of rules to govern access to resources or functionalities. These policies state the authorization level that is granted to users based on their roles. The permission policies are implemented to maintain security and confidentiality within a given environment.

You can define the following types of permissions in Developer Hub:

  • resource type
  • basic

The distinction between the two permission types depend on whether a permission includes a defined resource type.

You can define the resource type permission using either the associated resource type or the permission name as shown in the following example:

Example resource type permission definition

p, role:default/myrole, catalog.entity.read, read, allow
g, user:default/myuser, role:default/myrole

p, role:default/another-role, catalog-entity, read, allow
g, user:default/another-user, role:default/another-role
Copy to Clipboard Toggle word wrap

You can define the basic permission in Developer Hub using the permission name as shown in the following example:

Example basic permission definition

p, role:default/myrole, catalog.entity.create, create, allow
g, user:default/myuser, role:default/myrole
Copy to Clipboard Toggle word wrap

Developer Hub supports following permission policies:

Catalog permissions
.Catalog permissions
Expand
NameResource typePolicyDescription

catalog.entity.read

catalog-entity

read

Allows a user or role to read from the catalog

catalog.entity.create

 

create

Allows a user or role to create catalog entities, including registering an existing component in the catalog

catalog.entity.refresh

catalog-entity

update

Allows a user or role to refresh a single or multiple entities from the catalog

catalog.entity.delete

catalog-entity

delete

Allows a user or role to delete a single or multiple entities from the catalog

catalog.location.read

 

read

Allows a user or role to read a single or multiple locations from the catalog

catalog.location.create

 

create

Allows a user or role to create locations within the catalog

catalog.location.delete

 

delete

Allows a user or role to delete locations from the catalog

Bulk import permission
.Bulk import permission
Expand
NameResource typePolicyDescription

bulk.import

bulk-import

use

Allows the user to access the bulk import endpoints, such as listing all repositories and organizations accessible by all GitHub integrations and managing the import requests

Scaffolder permissions
.Scaffolder permissions
Expand
NameResource typePolicyDescription

scaffolder.action.execute

scaffolder-action

use

Allows the execution of an action from a template

scaffolder.template.parameter.read

scaffolder-template

read

Allows a user or role to read a single or multiple one parameters from a template

scaffolder.template.step.read

scaffolder-template

read

Allows a user or role to read a single or multiple steps from a template

scaffolder.task.create

 

create

Allows a user or role to trigger software templates which create new scaffolder tasks

scaffolder.task.cancel

 

use

Allows a user or role to cancel currently running scaffolder tasks

scaffolder.task.read

 

read

Allows a user or role to read all scaffolder tasks and their associated events and logs

RBAC permissions
.RBAC permissions
Expand
NameResource typePolicyDescription

policy.entity.read

policy-entity

read

Allows a user or role to read permission policies and roles

policy.entity.create

policy-entity

create

Allows a user or role to create a single or multiple permission policies and roles

policy.entity.update

policy-entity

update

Allows a user or role to update a single or multiple permission policies and roles

policy.entity.delete

policy-entity

delete

Allows a user or role to delete a single or multiple permission policies and roles

Kubernetes permissions
.Kubernetes permissions
Expand
NameResource typePolicyDescription

kubernetes.proxy

 

use

Allows a user or role to access the proxy endpoint

OCM permissions
Expand
NameResource typePolicyDescription

ocm.entity.read

 

read

Allows a user or role to read from the OCM plugin

ocm.cluster.read

 

read

Allows a user or role to read the cluster information in the OCM plugin

Topology permissions
.Topology permissions
Expand
NameResource typePolicyDescription

topology.view.read

 

read

Allows a user or role to view the topology plugin

kubernetes.proxy

 

use

Allows a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within RHDH

Volver arriba
Red Hat logoGithubredditYoutubeTwitter

Aprender

Pruebe, compre y venda

Comunidades

Acerca de la documentación de Red Hat

Ayudamos a los usuarios de Red Hat a innovar y alcanzar sus objetivos con nuestros productos y servicios con contenido en el que pueden confiar. Explore nuestras recientes actualizaciones.

Hacer que el código abierto sea más inclusivo

Red Hat se compromete a reemplazar el lenguaje problemático en nuestro código, documentación y propiedades web. Para más detalles, consulte el Blog de Red Hat.

Acerca de Red Hat

Ofrecemos soluciones reforzadas que facilitan a las empresas trabajar en plataformas y entornos, desde el centro de datos central hasta el perímetro de la red.

Theme

© 2025 Red Hat