The API Gateway Manager features an internal identity provider, allowing users within this system to be assigned to multiple permission groups. These groups enable access to specific functionalities within the API Gateway Manager. This approach, known as Role-Based Access Control (RBAC), is instrumental in granting users tailored access levels to the system, ensuring they have permissions that align with their needs and responsibilities. Importantly, the enforcement of these access controls is consistently applied both in the user interface and within the management API, providing a unified and secure approach to managing user access and permissions.

Create User

Internal Users and API Users

To create a user in the API Gateway Manager, first, access the Users Menu from the left sidebar. In the Users Menu toolbar, you will find three options:


Invite New Internal User sends an email to the specified address, providing a link for the user to set their own password at their convenience.

By selecting Create New Internal User you can create a user account and assign a password directly.

The Create New API User function is designed to establish a service account-type user, which uniquely doesn't require an email address for setup. This category of user is typically utilized for programmatic machine access through the Gateway Manager's REST API. Notably, these API users are not equipped with the capability to log in via the Web User Interface (UI), aligning with their intended use for backend, automated processes rather than direct user interaction.
This type of user can be assigned specific roles, and it's important to clearly define the environments to which it has access. This precise specification ensures appropriate security measures and operational efficiency, tailoring the user's capabilities to the necessary environments only.

Bildschirmfoto am 2024-01-15 um 08.29.53.png

Please note that you need to have a SMTP server configured in order to use the “Invite User” feature.

Both user creation wizards prompt you to select an initial permission group for the new user. Subsequently, you have the flexibility to add more permission groups or modify the original one through the user details view. This approach provides initial access control while allowing for adaptable permissions management as user roles evolve or require adjustments.

SAML and LDAP User

If LDAP or SAML authentication is set up within the Configuration → Authentication page, users can access the Gateway Manager using their standard LDAP or SAML credentials, eliminating the need to create user accounts in the Gateway Manager beforehand. However, for security purposes, these users are not automatically assigned any roles upon login. An administrator must explicitly grant the necessary permissions to each user after the user’s initial login.

Typically, a user's LDAP username corresponds to the "User name attribute" or 'cn' (common name), not their email address.

Ensure not to create any user accounts in the User Interface (UI) before the individual has logged in using their LDAP credentials.

Bildschirmfoto am 2024-01-15 um 08.29.47.png

Permission groups (RBAC)

There are 8 different permission groups.

Edit a User

Bildschirmfoto am 2024-03-11 um 06.53.02.png

Edit User Details

Change Password

The password can only be set for internal and api users.

Permissions

The roles can be freely added to the user here. A user can also have several roles. For some roles, it must be specified which environments the user may access.

RBAC environmental settings

For users not assigned to the administrator permission group, it's essential to specify the environments they can access. Each environment has two distinct permissions that can be assigned: Read and Write. A user with Read permission can view every node and cluster within the specified environment, as well as their statuses. On the other hand, a user granted Write permission has the ability to perform actions corresponding to their assigned permission groups within that environment. This dual-level permission structure allows for both visibility (Read) and operational control (Write), based on the user's role and the permissions granted.