Securing access to EDA

EDA uses Keycloak, a well-known and secure solution, for its identity and access management. Authentication is required to interact with EDA.

EDA implements authorization through role-based access control (RBAC) includes the following elements:

Users
Individuals with access to the system. Each user has a user information profile to store information about them. System administrators can assign users to user groups.
User groups
A collection of users organized according to the type of activities they are meant to perform. You assign resource access rights to user groups through user roles. When you assign a role to a user group, all access rights defined in the role are inherited by the users of the group.
Roles
Specifies which resources users or associated user group members can access. You assign network resource access to roles through resource groups. Each member of a group can perform the roles specified for that group.

A role that exists in a namespace is referred to as a role. A role that exists cluster wide (that is, it is not in a namespace) is referred to as a cluster role.

A user can belong to more than one group, and a group can be assigned multiple roles.