Este contenido no está disponible en el idioma seleccionado.

Chapter 4. Managing model registry permissions


You can manage access to a model registry for individual users and user groups in your organization, and for service accounts in a project.

Note

OpenShift AI creates the <model-registry-name>-users group automatically for use with model registries. You can add users to this group in OpenShift, or ask the cluster administrator to do so.

The model registry operator uses OpenShift Role-Based Access Control (RBAC), and creates various RBAC resources in the rhoai-model-registries namespace.

For each model registry instance, the operator creates a registry-users-<model registry instance name> role and an OpenShift group called <model registry instance name>-users. To grant an individual user, service account, or group access to a model registry instance, your cluster administrator must create a role binding to the registry-users-<model registry instance name> role for the instance.

The <model registry instance name>-users group has a role binding to the registry-users-<model registry instance name> role. Your cluster administrator can add users to this group to grant them access to the model registry instance without needing to create a role binding for each user.

For more information about managing RBAC in OpenShift, see Using RBAC to define and apply permissions.

Prerequisites

  • You have logged in to OpenShift AI as a user with OpenShift AI administrator privileges.
  • An available model registry exists in your deployment.
  • The users and groups that you want to provide access to already exist in OpenShift. For more information, see Managing users and groups.

Procedure

  1. From the OpenShift AI dashboard, click Settings Model registry settings.
  2. Click Manage permissions beside the model registry that you want to manage access for.

    The permissions page for the model registry opens.

  3. Provide one or more OpenShift groups with access to the project.

    1. On the Users tab, in the Groups section, click Add group.
    2. From the Select a group drop-down list, select a group.

      Note

      To enable access for all cluster users, add system:authenticated to the group list.

    3. To confirm your entry, click Confirm ( The Confirm icon ).
    4. Optional: To add an additional group, click Add group and repeat the process.
  4. Provide one or more users with access to the model registry.

    1. On the Users tab, in the Users section, click Add user.
    2. In the Type username field, enter the username of the user to whom you want to provide access.
    3. To confirm your entry, click Confirm ( The Confirm icon ).
    4. Optional: To add an additional user, click Add user and repeat the process.
  5. Provide all service accounts in a project with access to the model registry.

    1. On the Projects tab, in the Projects section, click Add project.
    2. In the Select or enter a project field, select or enter the name of the project to which you want to provide access.
    3. To confirm your entry, click Confirm ( The Confirm icon ).
    4. Optional: To add an additional project, click Add project and repeat the process.

Verification

  • Users, groups, and accounts that were granted access to a model registry can register, view, edit, version, deploy, delete, archive, and restore models in that registry.
  • The Users and Groups sections on the Permissions tab show the respective users and groups that you granted access to the model registry.
  • The Projects sections on the Projects tab show the projects that you granted access to the model registry.

After you provide access to a model registry, users with access can store, share, version, deploy, and track models using the model registry feature. For more information, see Working with model registries.

Volver arriba
Red Hat logoGithubredditYoutubeTwitter

Aprender

Pruebe, compre y venda

Comunidades

Acerca de la documentación de Red Hat

Ayudamos a los usuarios de Red Hat a innovar y alcanzar sus objetivos con nuestros productos y servicios con contenido en el que pueden confiar. Explore nuestras recientes actualizaciones.

Hacer que el código abierto sea más inclusivo

Red Hat se compromete a reemplazar el lenguaje problemático en nuestro código, documentación y propiedades web. Para más detalles, consulte el Blog de Red Hat.

Acerca de Red Hat

Ofrecemos soluciones reforzadas que facilitan a las empresas trabajar en plataformas y entornos, desde el centro de datos central hasta el perímetro de la red.

Theme

© 2025 Red Hat