Skip to content
Fetching contributors…
Cannot retrieve contributors at this time
79 lines (45 sloc) 4.53 KB
title book chapter toc
RBAC and Permissions

RBAC in Kong Manager

Default Roles in Kong Manager

In addition to verifying users and distinguishing Workspaces, Kong Enterprise has the ability to enforce role-based access control (RBAC) for all resources. For the Super Admin (or any role with read and write access to /admins and /rbac), this ability entails permission to create new roles and customize permissions.


Default Roles

Kong includes Role-Based Access Control (RBAC). Every admin using Kong Manager will need an assigned Role based on the resources they have permission to access.

When a Super Admin starts Kong for the first time, the default Workspace will include three default Roles: read-only, admin, and super-admin. The three Roles have permissions related to every Workspace in the cluster.

Similarly, if a Role is confined to certain Workspaces, the user assigned to it will not be able to see either the overview or links to other Workspaces.

⚠️ IMPORTANT: Although a default admin has full permissions with every endpoint in Kong, only a Super Admin has the ability to assign and modify RBAC permissions. An admin is not able to modify their own permissions or delimit a Super Admin's permissions.

⚠️ IMPORTANT: If a Role does not have permission to access entire endpoints, the user assigned to the Role will not be able to see the related navigation links.

For more information about RBAC Roles in Kong Enterprise as a whole, see the RBAC Overview

RBAC in Workspaces

RBAC Roles and permissions will be specific to a Workspace if they are assigned from within one. For example, if there are two Workspaces, "Payments" and "Deliveries", an Admin created in "Payments" will not have access to any endpoints in "Deliveries".

When a Super Admin creates a new Workspace, there are three default Roles that mirror the cluster-level Roles, and a fourth unique to each Workspace: workspace-read-only, workspace-admin, workspace-super-admin, and workspace-portal-admin.

Default Roles in New Workspaces

⚠️ IMPORTANT: Any Role assigned in the "Default" Workspace will have permissions applied to all subsequently created Workspaces. A Super Admin in "Default" has RBAC permissions across all Workspaces.

How to Create RBAC Roles for Admins in the New Workspace

Your browser does not support the video tag.
  1. On the "Admins" page, to create a new Role, click the "Add Role" button at the top right of the list of Roles.

  2. On the "Add Role" form, name the Role according to the permissions you want to grant. Write a brief comment describing the permissions of the Role.

    New Role naming

  3. Click the "Add Permissions" button and fill out the form. Add the endpoint permissions by marking the appropriate checkbox.

    New Role permissions

  4. Click "Add Permission to Role" to see the permissions listed on the form.

    New Role permissions list

  5. To forbid access to certain endpoints, click "Add Permission" again and use the "negative" checkbox.

    Negative permissions

  6. See the new Role appear on the "Admins" page

    Roles list

⚠️ IMPORTANT: Every Admin who needs access to Kong Manager will need at least read access to the home "/" endpoint.

⚠️ IMPORTANT: A negative permission will always take precedence over a positive one.

Next: Managing Admins ›

You can’t perform that action at this time.