By inviting users to Red Hat Advanced Cluster Security for Kubernetes (RHACS), you can ensure that the right users have the appropriate access rights within your cluster. You can invite one or more users by assigning roles and defining the authentication provider.
By configuring access control in the RHACS portal, you can invite users to your RHACS instance.
In the RHACS portal, go to the Platform Configuration → Access Control → Auth providers tab, and then click Invite users.
In the Invite users dialog box, provide the following information:
Emails to invite: Enter one or more email addresses of the users you want to invite. Ensure that they are valid email addresses associated with the intended recipients.
Provider: From the drop-down list, select a provider you want to use for each invited user.
|
Role: From the drop-down list, select the role to assign to each invited user.
Click Invite users.
On the confirmation dialog box, you receive a confirmation that the users have been created with the selected role.
Copy the one or more email addresses and the message into an email that you create in your own email client, and send it to the users.
Click Done.
In the RHACS portal, go to the Platform Configuration → Access Control → Auth providers tab.
Select the authentication provider you used to invite users.
Scroll down to the Rules section.
Verify that the user emails and authentication provider roles have been added to the list.