Skip to content

https://issues.redhat.com/browse/ACM-29169--new fine grain and reorg …#8606

Open
swopebe wants to merge 5 commits into2.16_stagefrom
fine-grain-new
Open

https://issues.redhat.com/browse/ACM-29169--new fine grain and reorg …#8606
swopebe wants to merge 5 commits into2.16_stagefrom
fine-grain-new

Conversation

@swopebe
Copy link
Contributor

@swopebe swopebe commented Feb 23, 2026

…of content

@openshift-ci
Copy link

openshift-ci bot commented Feb 23, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: swopebe

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@@ -0,0 +1,9 @@
[#fine-grain-intro]
Copy link
Contributor Author

@swopebe swopebe Feb 24, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

new intro for review

*Required access:* Cluster administrator

.Prerequisites
== Assigning fine-grained role-based access control in the console
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ignore this, changes will be made in a different PR--do not review this file.

@@ -0,0 +1,112 @@
[#fine-grained-rbac-roles]
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

New content for review.

* xref:../secure_clusters/rbac_implement_rhacm.adoc#rhacm-rbac-implement[Implementing role-based access control]
* xref:../secure_clusters/fine_grain_rbac_cli.adoc#fine-grain-rbac-cli[Implementing fine-grained role-based access control in the terminal (Technology Preview)]
* xref:../secure_clusters/fine_grain_rbac_ui.adoc#fine-grain-rbac-ui[Implementing fine-grained role-based access control in the console (Technology Preview)]
* xref:../secure_clusters/fine_grain_rbac_intro.adoc#fine-grain-intro[Fine-grained role-based access control overview]
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This will be the only file needed in this intro.

[#fine-grain-enable]
= Enabling fine-grained role-based access control for virtualization

{acm} supports fine-grained role-based access control (RBAC) for virtual machine scenarios. As a cluster administrator, you can manage and control permissions at the namespace level and cluster level on your managed clusters. Grant permissions to a virtual machine namespace within a cluster without granting permission to the entire managed cluster.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would like to combine the last two sentences here and say that you can manage and grant permissions to other users.

the idea would be that as the super top admin, they can give permissions to others at namespace or cluster level


{acm} supports fine-grained role-based access control (RBAC) for virtual machine scenarios. As a cluster administrator, you can manage and control permissions at the namespace level and cluster level on your managed clusters. Grant permissions to a virtual machine namespace within a cluster without granting permission to the entire managed cluster.

Enabling fine-grained RBAC significantly changes how the console displays search results and manages access for application lifecycles, governance, and observability.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mshort55 any thoughts on this? I wasnt as involved with other this affected other areas but i was aware there were some search issues that happened when enabling fine-grained rbac


- *Optional:* Install the _Migration Toolkit for Virtualization operator_ if you plan to perform virtual migrations. (link--= Migrating virtual machines between clusters then check the OCP link))

- *Note:* If you enable the `cnv-mtv-integrations` feature in {acm-short}, the system automatically installs and configures both the OpenShift Virtualization and MTV operators for you.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

can we replace system with acm?

https://docs.redhat.com/en/documentation/red_hat_advanced_cluster_management_for_kubernetes/2.15/html/virtualization/acm-virt#migrate-vm
can we link to this doc about enabling because there are a bit more steps involve to enable it correctly so i dont want it to sound misleading when mentioning automatically


.Prerequisites

See the following prerequisites that are needed to enable fine-grained role-based access control:
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

seems like there is a request to add virtualization wording here see the google doc
https://docs.google.com/document/d/1OiP9vx7xMYkMPwTjSV5rofEgNAy__dW46Qrl2pFpuCs/edit?disco=AAAByzuBN4k

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We add it in the title and the description.

See the following steps to enable the `fine-grained-rbac` component in the `MultiClusterHub` resource:

. Run the following command to patch the resource. The default name of the custom resource is `multiclusterhub`, and `open-cluster-management` is the default namespace: If you have a different name or namespace, update the command:
//can this be changed?
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this whole part Run the following command to patch the resource. The default name of the custom resource is multiclusterhub, and open-cluster-managementis the default namespace: If you have a different name or namespace, update the command:
can be removed in my opinion if there is a conventional way it is doc to enabling a feature
I was looking at others and it seems like just providing the oc command works?

what do you think @swopebrandi1

[#fine-grain-intro]
= Fine-grained role-based access control for virtual machines

{acm} supports fine-grained role-based access control (RBAC) for virtual machine scenarios. As a cluster administrator, you can manage and control permissions at the namespace level and cluster level on your managed clusters. Grant permissions to a virtual machine namespace within a cluster without granting permission to the entire managed cluster.
Copy link

@kurwang kurwang Feb 25, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this seems to be duplicated I saw this in the enable part also
but i assume this is the correct spot?

if so my previous comment on that should be here instead

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We need a "short description" in all the topics, most of this was already there. We have to have something here for the introduction.

| Grants read-only access to `kubevirt` resources.
|===

* *Scenario two:* Administrative privilege in the console
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i would like to add the fleet virtualization ui here

Copy link

@kurwang kurwang left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

added my comments thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants