CCE cluster permissions are assigned based on IAM system policies and custom policies. You can use user groups to assign permissions to IAM users.
Cluster permissions are configured only for cluster-related resources (such as clusters and nodes). You must also configure namespace permissions to operate Kubernetes resources (such as workloads and Services).
On the CCE console, when you choose Permissions Management > Cluster-Level Permissions to create a user group, you will be directed to the IAM console to complete the process. After the user group is created and its permissions are configured, you can view the information on the Cluster-Level Permissions tab page. This section describes the operations in IAM.
Create a user group on the IAM console, and assign CCE permissions, for example, the CCE Viewer policy to the group.
CCE is deployed by region. On the IAM console, select Region-specific projects when assigning CCE permissions.
Create a user on the IAM console and add the user to the group created in 1.
Log in to the management console as the user you created, and verify that the user has the assigned permissions.
Custom policies can be created as a supplement to the system-defined policies of CCE.
You can create custom policies in either of the following ways:
This section provides examples of common custom CCE policies.
Example Custom Policies:
{
"Version": "1.1",
"Statement": [
{
"Effect": "Allow",
"Action": [
"cce:cluster:create"
]
}
]
}
A policy with only "Deny" permissions must be used in conjunction with other policies to take effect. If the permissions assigned to a user contain both "Allow" and "Deny", the "Deny" permissions take precedence over the "Allow" permissions.
The following method can be used if you need to assign permissions of the CCEFullAccess policy to a user but you want to prevent the user from deleting nodes (cce:node:delete). Create a custom policy for denying node deletion, and attach both policies to the group to which the user belongs. Then, the user can perform all operations on CCE except deleting nodes. The following is an example of a deny policy:
{ "Version": "1.1", "Statement": [ { "Effect": "Deny", "Action": [ "cce:node:delete" ] } ] }
A custom policy can contain the actions of multiple services that are of the global or project-level type. The following is an example policy containing actions of multiple services:
{ "Version": "1.1", "Statement": [ { "Action": [ "ecs:cloudServers:resize", "ecs:cloudServers:delete", "ecs:cloudServers:delete", "ims:images:list", "ims:serverImages:create" ], "Effect": "Allow" } ] }
CCE supports resource management and permission allocation by cluster and enterprise project.
Note that:
CCE is compatible with IAM system roles for permissions management. You are advised to use fine-grained policies provided by IAM to simplify permissions management.
CCE supports the following roles:
When RBAC and IAM policies co-exist, the backend authentication logic for open APIs or console operations on CCE is as follows:
Certain CCE APIs involve namespace-level permissions or key operations and therefore, they require special permissions:
Using clusterCert to obtain the cluster kubeconfig: cceadm/teadmin