Este conteúdo não está disponível no idioma selecionado.
Chapter 18. Impersonating the system:admin user
18.1. API impersonation Copiar o linkLink copiado para a área de transferência!
You can configure a request to the OpenShift Container Platform API to act as though it originated from another user. For more information, see User impersonation in the Kubernetes documentation.
18.2. Impersonating the system:admin user Copiar o linkLink copiado para a área de transferência!
You can use the OpenShift web console to impersonate a user and select multiple group memberships at the same time to reproduce that user’s effective permissions.
Procedure
To grant a user permission to impersonate
system:admin, run the following command:oc create clusterrolebinding <any_valid_name> --clusterrole=sudoer --user=<username>
$ oc create clusterrolebinding <any_valid_name> --clusterrole=sudoer --user=<username>Copy to Clipboard Copied! Toggle word wrap Toggle overflow TipYou can alternatively apply the following YAML to grant permission to impersonate
system:admin:Copy to Clipboard Copied! Toggle word wrap Toggle overflow
18.3. Impersonating the system:admin group Copiar o linkLink copiado para a área de transferência!
When a system:admin user is granted cluster administration permissions through a group, you must include the --as=<user> --as-group=<group1> --as-group=<group2> parameters in the command to impersonate the associated groups.
Procedure
To grant a user permission to impersonate a
system:adminby impersonating the associated cluster administration groups, run the following command:oc create clusterrolebinding <any_valid_name> --clusterrole=sudoer --as=<user> \ --as-group=<group1> --as-group=<group2>
$ oc create clusterrolebinding <any_valid_name> --clusterrole=sudoer --as=<user> \ --as-group=<group1> --as-group=<group2>Copy to Clipboard Copied! Toggle word wrap Toggle overflow
18.4. Impersonating a user with multiple group memberships in the web console Copiar o linkLink copiado para a área de transferência!
You can start user impersonation from multiple locations in the OpenShift Container Platform Console. Depending on where you start, you can impersonate a single user, a single group, or a user with one or more group memberships.
Prerequisites
- You must be logged in to the OpenShift Container Platform web console as a user with permission to impersonate other users.
- The user or group that you want to impersonate must already exist.
The impersonated user can belong to zero or more groups.
Procedure
- From the Overview page in the OpenShift Container Platform console, click your user name and select Impersonate User.
- In the Username field in the Impersonate dialog, enter the name of the user you want to impersonate.
Optional: In the Groups field, choose one or more groups that are associated with the user.
The dialog displays a warning message explaining that impersonation applies the effective permissions of the specified user and any selected groups.
- Click Impersonate to impersonate your selected user, groups, or both.
Selecting one group uses the existing single-group impersonation behavior. Selecting no groups uses regular single-user impersonation.
18.5. Starting impersonation from the Users or Groups pages Copiar o linkLink copiado para a área de transferência!
You can start impersonation for users or groups from the Users or Groups pages in the OpenShift Container Platform Console.
Procedure
-
From the Overview page in the OpenShift Container Platform console, click User Management
Users. - Open the menu for the user you want to impersonate and select Impersonate User.
-
Optional: To impersonate a group, click User Management
Groups, click the menu for that group, and select Impersonate Group.
18.6. Stopping impersonation Copiar o linkLink copiado para a área de transferência!
You can stop impersonating a user or group at any time from the OpenShift Container Platform Console.
Procedure
- On any page in the OpenShift Container Platform console, click Stop impersonating at the top of the page.
- Alternatively, click your user name and select Stop impersonating.
18.7. Adding unauthenticated groups to cluster roles Copiar o linkLink copiado para a área de transferência!
As a cluster administrator, you can add unauthenticated users to the following cluster roles in OpenShift Container Platform by creating a cluster role binding. Unauthenticated users do not have access to non-public cluster roles. This should only be done in specific use cases when necessary.
You can add unauthenticated users to the following cluster roles:
-
system:scope-impersonation -
system:webhook -
system:oauth-token-deleter -
self-access-reviewer
Always verify compliance with your organization’s security standards when modifying unauthenticated access.
Prerequisites
-
You have access to the cluster as a user with the
cluster-adminrole. -
You have installed the OpenShift CLI (
oc).
Procedure
Create a YAML file named
add-<cluster_role>-unauth.yamland add the following content:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Apply the configuration by running the following command:
oc apply -f add-<cluster_role>.yaml
$ oc apply -f add-<cluster_role>.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow