Role-based access control (RBAC)

All associated permissions (service accounts, roles, role bindings) we set up are shown below.

Service Accounts for IBM Industry Solutions Workbench

The following service accounts including the associated roles are created during the installation process:

Service Account Name Namespace of Service Account Associated Roles / granted in Namespace
k5-admin-sa install project (e.g. k5-tools)

k5-admin-role (Role) / install project (e.g. k5-tools)

k5-admin-sa k5 projects (e.g. dev-stage)

admin (ClusterRole) / k5 projects (e.g. dev-stage)

k5-editor-sa k5 projects (e.g. dev-stage)

edit (ClusterRole) / k5 projects (e.g. dev-stage)

k5-operator-sa install project (e.g. k5-tools)

k5-admin-role (Role) / install project (e.g. k5-tools)

k5-operator-role (Role) / install project (e.g. k5-tools)

admin (ClusterRole) / k5 projects (e.g. dev-stage) (Applied manually)

k5-pipeline-sa install project (e.g. k5-tools)

k5-pipeline-role (Role) / install project (e.g. k5-tools)

admin (ClusterRole) / k5 projects (e.g. dev-stage) (Applied manually)

k5-viewer-sa install project (e.g. k5-tools)

k5-viewer-role (Role) / install project (e.g. k5-tools)

k5-viewer-sa k5 projects (e.g. dev-stage)

view (ClusterRole) / k5 projects (e.g. dev-stage)

Roles/ClusterRoles for IBM Industry Solutions Workbench

The following roles are created during the installation process:

Role Namespace of Role ApiGroups Resources Verbs

k5-admin-role

k5-viewer-role

install project (e.g. k5-tools)

""

apps

argoproj.io

autoscaling

image.openshift.io

rbac.authorization.k8s.io

route.openshift.io

tekton.dev

triggers.tekton.dev

configmaps

namespaces

pods

secrets (only k5-admin-role)

services

serviceaccounts

deployments

applications

horizontalpodautoscalers

imagestreams

imagestreams/layers

roles

rolebindings

routes

pipelineresources

pipelineruns

pipelines

taskruns

tasks

eventlisteners

triggertemplates

create (only k5-admin-role)

delete (only k5-admin-role)

get

list

patch (only k5-admin-role)

update (only k5-admin-role)

watch

k5-operator-role install project (e.g. k5-tools)

k5.project.operator

k5.config

k5clients

k5dashboards

k5pipelinemanagers

k5projects

k5realms

k5topics

create

delete

get

list

patch

update

watch

k5-pipeline-role install project (e.g. k5-tools)

""

image.openshift.io

secrets

configmaps

imagestreams

imagestreams/layers

create

get

list

patch

update

k5-aggregate-admin-role cluster-wide k5.config k5externalsecrets/status

create

delete

get

list

patch

update

watch

Role Bindings for existing Service Accounts for IBM Industry Solutions Workbench

The following role bindings for existing service accounts are created during the installation process:

Service Account Name Namespace of Service Account Associated Roles / granted in Namespace
openshift-gitops-argocd-application-controller (required if OpenShift GitOps Operator is used openshift-gitops

admin (ClusterRole) / openshift-gitops

Security Context Constraints (SCC) for IBM Industry Solutions Workbench

The following Security Context Constraints (SCC) are applied manually:

Service Account Name Namespace of Service Account Associated SCC
k5-pipeline-sa install project (e.g. k5-tools) pipelines-scc