Ce contenu n'est pas disponible dans la langue sélectionnée.

Chapter 4. Managing model registry permissions


You can manage access to a model registry for individual users and user groups in your organization, and for service accounts in a project.

Note

OpenShift AI creates the <model-registry-name>-users group automatically for use with model registries. You can add users to this group in OpenShift, or ask the cluster administrator to do so.

The model registry operator uses OpenShift Role-Based Access Control (RBAC), and creates various RBAC resources in the rhoai-model-registries namespace.

For each model registry instance, the operator creates a registry-users-<model registry instance name> role and an OpenShift group called <model registry instance name>-users. To grant an individual user, service account, or group access to a model registry instance, your cluster administrator must create a role binding to the registry-users-<model registry instance name> role for the instance.

The <model registry instance name>-users group has a role binding to the registry-users-<model registry instance name> role. Your cluster administrator can add users to this group to grant them access to the model registry instance without needing to create a role binding for each user.

For more information about managing RBAC in OpenShift, see Using RBAC to define and apply permissions.

Prerequisites

  • You have logged in to OpenShift AI as a user with OpenShift AI administrator privileges.
  • An available model registry exists in your deployment.
  • The users and groups that you want to provide access to already exist in OpenShift. For more information, see Managing users and groups.

Procedure

  1. From the OpenShift AI dashboard, click Settings Model registry settings.
  2. Click Manage permissions beside the model registry that you want to manage access for.

    The permissions page for the model registry opens.

  3. Provide one or more OpenShift groups with access to the project.

    1. On the Users tab, in the Groups section, click Add group.
    2. From the Select a group drop-down list, select a group.

      Note

      To enable access for all cluster users, add system:authenticated to the group list.

    3. To confirm your entry, click Confirm ( The Confirm icon ).
    4. Optional: To add an additional group, click Add group and repeat the process.
  4. Provide one or more users with access to the model registry.

    1. On the Users tab, in the Users section, click Add user.
    2. In the Type username field, enter the username of the user to whom you want to provide access.
    3. To confirm your entry, click Confirm ( The Confirm icon ).
    4. Optional: To add an additional user, click Add user and repeat the process.
  5. Provide all service accounts in a project with access to the model registry.

    1. On the Projects tab, in the Projects section, click Add project.
    2. In the Select or enter a project field, select or enter the name of the project to which you want to provide access.
    3. To confirm your entry, click Confirm ( The Confirm icon ).
    4. Optional: To add an additional project, click Add project and repeat the process.

Verification

  • Users, groups, and accounts that were granted access to a model registry can register, view, edit, version, deploy, delete, archive, and restore models in that registry.
  • The Users and Groups sections on the Permissions tab show the respective users and groups that you granted access to the model registry.
  • The Projects sections on the Projects tab show the projects that you granted access to the model registry.

After you provide access to a model registry, users with access can store, share, version, deploy, and track models using the model registry feature. For more information, see Working with model registries.

Retour au début
Red Hat logoGithubredditYoutubeTwitter

Apprendre

Essayez, achetez et vendez

Communautés

À propos de la documentation Red Hat

Nous aidons les utilisateurs de Red Hat à innover et à atteindre leurs objectifs grâce à nos produits et services avec un contenu auquel ils peuvent faire confiance. Découvrez nos récentes mises à jour.

Rendre l’open source plus inclusif

Red Hat s'engage à remplacer le langage problématique dans notre code, notre documentation et nos propriétés Web. Pour plus de détails, consultez le Blog Red Hat.

À propos de Red Hat

Nous proposons des solutions renforcées qui facilitent le travail des entreprises sur plusieurs plates-formes et environnements, du centre de données central à la périphérie du réseau.

Theme

© 2025 Red Hat