Skip to content

Instantly share code, notes, and snippets.

@benarent
Created March 11, 2020 15:39
Show Gist options
  • Save benarent/9e32211663c1cfc22f3ae94e33d72be0 to your computer and use it in GitHub Desktop.
Save benarent/9e32211663c1cfc22f3ae94e33d72be0 to your computer and use it in GitHub Desktop.
Roles
#
# Example resource for a role
#
kind: role
version: v3
metadata:
# insert the name of your role here:
name: role_name
spec:
# SSH options used for user sessions
options:
# max_session_ttl defines the TTL (time to live) of SSH certificates
# issued to the users with this role.
max_session_ttl: 30h0m0s
# forward_agent turns on/off SSH agent forwarding
forward_agent: true
cert_format: standard
enhanced_recording:
- command
- network
# allow section declares a list of resource/verb combinations that are
# allowed for the users of this role. by default nothing is allowed.
allow:
# logins array defines the OS logins a user is allowed to use.
# A few special variables are supported here (see below)
logins: [root, '{{internal.logins}}']
# node labels that a user can connect to. The wildcard ('*') means "any node"
node_labels:
'*': '*'
# see below.
rules:
- resources: [role]
verbs: [list, create, read, update, delete]
- resources: [auth_connector]
verbs: [connect, list, create, read, update, delete]
- resources: [session]
verbs: [list, read]
- resources: [trusted_cluster]
verbs: [connect, list, create, read, update, delete]
# the deny section uses the identical format as the 'allow' section.
# the deny rules always override allow rules.
deny: {}

ROLE BASED ACCESS CONTROL Kuberntes and SSH authentication in one place. A Teleport role can be assigned based on user identity when used with single sign-on (SSO). Learn more about Role Based Acess Control

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment