OpenShift Security Concepts: Difference between revisions
Jump to navigation
Jump to search
(→User) |
(→User) |
||
Line 6: | Line 6: | ||
=User= | =User= | ||
Interaction with OpenShift is associated with a ''user''. The users are internally represented with an <tt>User</tt> object, which in turn represents an ''actor''. Permissions can be given to actors in the system by adding roles to them, or their [[#Group|groups]]. There are several user types: | |||
==Regular User== | ==Regular User== |
Revision as of 19:57, 5 July 2017
External
Internal
User
Interaction with OpenShift is associated with a user. The users are internally represented with an User object, which in turn represents an actor. Permissions can be given to actors in the system by adding roles to them, or their groups. There are several user types:
Regular User
System User
Group
Authentication
Authentication Methods
Identity Providers
Authorization
Security Context Constraints
OpenShift uses Security Context Constraints (SCCs) to control the actions that a pod can perform and what it has the ability to access.