This feature is currently in Private Preview. In order to use this feature your Pulsar Clusters must be on the rapid channel and be on version 3.3.2.5, 4.0.0.9 or greater. Contact StreamNative for it to be enabled.
Role-based access control (RBAC) allows you to control what level of access users have to your organization’s resources, including but not limited to instances, clusters, tenants, namespaces, topics, schemas, service accounts, and more. Use RBAC to protect your StreamNative Cloud resources and data by authorizing and restricting access to principals and by delegating access authorization to the appropriate business units and teams in your organization.
Before using RBAC, it is important to understand the following concepts:
In RBAC, there are a few key concepts:
A principal is an entity that can be granted access to resources. Principals can be User Accounts, Service Accounts, or Identity Pools.
A predefined role defines the boundary of permissions it can operate, and a predefined role can be assigned to principals.
A role binding assigns a predefined role to a principal. Role bindings are used to grant permissions to principals.
The RBAC workflow consists of two main parts:
Users can manage (create
, update
, or delete
) RBAC roles and role bindings using:
Once resources are created, the StreamNative Cloud control plane automatically monitors them and propagates any changes to different components and resources for validation.
Each component in both the control plane and data plane receives the RBAC settings (roles and bindings) and uses them for validation. For example, when a user attempts to produce to a topic, the action is validated against the RBAC settings. If the user does not have the necessary permissions, the action is rejected.
This feature is currently in Private Preview. In order to use this feature your Pulsar Clusters must be on the rapid channel and be on version 3.3.2.5, 4.0.0.9 or greater. Contact StreamNative for it to be enabled.
Role-based access control (RBAC) allows you to control what level of access users have to your organization’s resources, including but not limited to instances, clusters, tenants, namespaces, topics, schemas, service accounts, and more. Use RBAC to protect your StreamNative Cloud resources and data by authorizing and restricting access to principals and by delegating access authorization to the appropriate business units and teams in your organization.
Before using RBAC, it is important to understand the following concepts:
In RBAC, there are a few key concepts:
A principal is an entity that can be granted access to resources. Principals can be User Accounts, Service Accounts, or Identity Pools.
A predefined role defines the boundary of permissions it can operate, and a predefined role can be assigned to principals.
A role binding assigns a predefined role to a principal. Role bindings are used to grant permissions to principals.
The RBAC workflow consists of two main parts:
Users can manage (create
, update
, or delete
) RBAC roles and role bindings using:
Once resources are created, the StreamNative Cloud control plane automatically monitors them and propagates any changes to different components and resources for validation.
Each component in both the control plane and data plane receives the RBAC settings (roles and bindings) and uses them for validation. For example, when a user attempts to produce to a topic, the action is validated against the RBAC settings. If the user does not have the necessary permissions, the action is rejected.