此内容没有您所选择的语言版本。

Chapter 20. Inviting users to your RHACS instance


By inviting users to Red Hat Advanced Cluster Security for Kubernetes (RHACS), you can ensure that the right users have the appropriate access rights within your cluster. You can invite one or more users by assigning roles and defining the authentication provider.

20.1. Configuring access control and sending invitations

By configuring access control in the RHACS portal, you can invite users to your RHACS instance.

Procedure

  1. In the RHACS portal, go to the Platform Configuration Access Control Auth providers tab, and then click Invite users.
  2. In the Invite users dialog box, provide the following information:

    • Emails to invite: Enter one or more email addresses of the users you want to invite. Ensure that they are valid email addresses associated with the intended recipients.
    • Provider: From the drop-down list, select a provider you want to use for each invited user.

      Important
      • If you have only one authentication provider available, it is selected by default.
      • If multiple authentication providers are available and at least one of them is Red Hat SSO or Default Internal SSO, that provider is selected by default.
      • If multiple authentication providers are available, but none of them is Red Hat SSO or Default Internal SSO, you are prompted to select one manually.
      • If you have not yet set up an authentication provider, a warning message appears and the form is disabled. Click the link, which takes you to the Access Control section to configure an authentication provider.
    • Role: From the drop-down list, select the role to assign to each invited user.
  3. Click Invite users.
  4. On the confirmation dialog box, you receive a confirmation that the users have been created with the selected role.
  5. Copy the one or more email addresses and the message into an email that you create in your own email client, and send it to the users.
  6. Click Done.

Verification

  1. In the RHACS portal, go to the Platform Configuration Access Control Auth providers tab.
  2. Select the authentication provider you used to invite users.
  3. Scroll down to the Rules section.
  4. Verify that the user emails and authentication provider roles have been added to the list.
返回顶部
Red Hat logoGithubredditYoutubeTwitter

学习

尝试、购买和销售

社区

关于红帽文档

通过我们的产品和服务,以及可以信赖的内容,帮助红帽用户创新并实现他们的目标。 了解我们当前的更新.

让开源更具包容性

红帽致力于替换我们的代码、文档和 Web 属性中存在问题的语言。欲了解更多详情,请参阅红帽博客.

關於紅帽

我们提供强化的解决方案,使企业能够更轻松地跨平台和环境(从核心数据中心到网络边缘)工作。

Theme

© 2025 Red Hat