For admin access, make sure that when using
kubectl or trying
to access the K10 dashboard with Token Authentication
you authenticate with a user that has a ClusterRoleBinding to the
Non-admin users may be granted limited permissions to K10. Read-only access to
the dashboard config is granted by creating a ClusterRoleBinding between
the user and the predefined
k10-config-view role. In addition, users
may be granted operational access to their applications by creating a
RoleBinding to the
k10-basic role in their application's namespace.
Additional RBAC Access
K10 now supports a more flexible permissions model which allows scoping of user permissions to perform K10 actions only within the context of specified applications.
Check out K10 RBAC for more information.