이 콘텐츠는 선택한 언어로 제공되지 않습니다.

Chapter 20. Inviting users to your RHACS instance


By inviting users to Red Hat Advanced Cluster Security for Kubernetes (RHACS), you can ensure that the right users have the appropriate access rights within your cluster. You can invite one or more users by assigning roles and defining the authentication provider.

20.1. Configuring access control and sending invitations

By configuring access control in the RHACS portal, you can invite users to your RHACS instance.

Procedure

  1. In the RHACS portal, go to the Platform Configuration Access Control Auth providers tab, and then click Invite users.
  2. In the Invite users dialog box, provide the following information:

    • Emails to invite: Enter one or more email addresses of the users you want to invite. Ensure that they are valid email addresses associated with the intended recipients.
    • Provider: From the drop-down list, select a provider you want to use for each invited user.

      Important
      • If you have only one authentication provider available, it is selected by default.
      • If multiple authentication providers are available and at least one of them is Red Hat SSO or Default Internal SSO, that provider is selected by default.
      • If multiple authentication providers are available, but none of them is Red Hat SSO or Default Internal SSO, you are prompted to select one manually.
      • If you have not yet set up an authentication provider, a warning message appears and the form is disabled. Click the link, which takes you to the Access Control section to configure an authentication provider.
    • Role: From the drop-down list, select the role to assign to each invited user.
  3. Click Invite users.
  4. On the confirmation dialog box, you receive a confirmation that the users have been created with the selected role.
  5. Copy the one or more email addresses and the message into an email that you create in your own email client, and send it to the users.
  6. Click Done.

Verification

  1. In the RHACS portal, go to the Platform Configuration Access Control Auth providers tab.
  2. Select the authentication provider you used to invite users.
  3. Scroll down to the Rules section.
  4. Verify that the user emails and authentication provider roles have been added to the list.
Red Hat logoGithubredditYoutubeTwitter

자세한 정보

평가판, 구매 및 판매

커뮤니티

Red Hat 문서 정보

Red Hat을 사용하는 고객은 신뢰할 수 있는 콘텐츠가 포함된 제품과 서비스를 통해 혁신하고 목표를 달성할 수 있습니다. 최신 업데이트를 확인하세요.

보다 포괄적 수용을 위한 오픈 소스 용어 교체

Red Hat은 코드, 문서, 웹 속성에서 문제가 있는 언어를 교체하기 위해 최선을 다하고 있습니다. 자세한 내용은 다음을 참조하세요.Red Hat 블로그.

Red Hat 소개

Red Hat은 기업이 핵심 데이터 센터에서 네트워크 에지에 이르기까지 플랫폼과 환경 전반에서 더 쉽게 작업할 수 있도록 강화된 솔루션을 제공합니다.

Theme

© 2026 Red Hat
맨 위로 이동