Skip to main content

Default Groups, Roles, and Policies

This topic lists the default global user groups, roles, and access policies that come out of the box with Wayfinder. Whenever a workspace is created, these will automatically be inherited by that workspace. You can create additional groups, roles, and access policies to meet your needs. To understand these concepts, and get details on creating your own RBAC resources see:


Default groups

This table lists each default group's permissions on the resources shown in each column. For more information, see the group descriptions below.

Workspace GroupNon-Prod
Namespaces
Non-Prod
Clusters
Prod
Namespaces
Prod
Clusters
owner
(Workspace owner)
Full CRUD
(access to namespace quotas and limits is blocked in tenant namespaces)
Full CRUDFull CRUDFull CRUD
member
(Workspace member)
Full CRUD minus secrets GETFull CRUD minus secrets GET
editorFull CRUD minus secrets GETFull CRUD minus secrets GETRead-only minus secrets GETRead-only minus secrets GET
viewerRead-only minus secrets GETRead-only minus secrets GETRead-only minus secrets GETRead-only minus secrets GET
secretsviewer-prodSecrets GET
secretsviewer-nonprodSecrets GET
troubleshooting
(Exec into and view logs for containers)
ExecExec

Group descriptions

  • owner

    Users in the owner group own their workspace in Wayfinder. They are able to manage groups, access policies and roles within the workspace. They can also add other users to groups.

    This is a Wayfinder defined group that governs what members can do within Wayfinder (not the infrastructure Wayfinder manages). To provide access to Wayfinder managed infrastructure, add users to an appropriate group.

    This group’s permissions cannot be changed by users through access policies or roles.

  • member

    Users in the member group have read-only access to their workspace (users, groups, roles, etc). They do not have the ability to change groups, roles or access policies.

    This is a Wayfinder defined group that governs what members can do within Wayfinder (not the infrastructure Wayfinder manages). To provide access to Wayfinder managed infrastructure, add users to an appropriate group.

    This group’s permissions cannot be changed by users through access policies or roles.

  • editor

    Users in this group have super-user access to namespaces in Non-Production, and read-only access to clusters. In Production they only have read-only access to namespaces and clusters. However, this role does not allow viewing secrets, since reading the contents of secrets enables access to ServiceAccount credentials in the namespace. That access resides separately in the secretsviewer group. For multi-tenanted namespaces, users are not allowed to change namespace quotas and limits on clusters owned by other workspaces.

  • viewer

    Users in this group have read-only access to both Production and Non-Production clusters and namespaces. However, this role does not allow viewing secrets, since reading the contents of secrets enables access to ServiceAccount credentials in the namespace. That access resides separately in the secretsviewer group.

  • secretsviewer-prod

    Users in this group have access to see secrets, and other sensitive Kubernetes configuration data in Production.

  • secretsviewer-nonprod

    Users in this group have access to see secrets, and other sensitive Kubernetes configuration data in Non-Production.

  • troubleshooting

    Users in this group can exec into containers to view logs and diagnose issues. It should only be assigned temporarily.


Default roles

Default global roles are available to all workspaces, and are read-only in workspaces. Wayfinder admins can disable default global roles.

This table lists Wayfinder's default roles.

RoleDescription
cluster.adminStandard Kubernetes cluster-admin role
cluster.viewStandard Kubernetes view role
namespace.adminStandard Kubernetes admin role minus secrets GET
namespace.editStandard Kubernetes edit role
namespace.viewStandard Kubernetesview role restricted to namespace level resources only
namespace.troubleshootingExec into and view logs for containers
secrets.viewGet secrets (and anything else related)

Default access policies

Default global access policies are available to all workspaces, and are read-only in workspaces. Wayfinder admins can disable default global policies.

This table lists Wayfinder's default global access policies and the user groups, roles, and [stage]/wayfinder/admin/stages/stages-overview they apply to.

PolicyDescriptionGroupsRolesStage
admin.prodAllows the admin group to have full admin access to clusters in Productionownercluster.adminproduction
admin.nonprodAllows the admin group to have full admin access to clusters in Non-Productionownercluster.adminnon-production
editor.prodAllows editors to view clusters in Productioneditorcluster.view, namespace.viewproduction
editor.nonprodAllows editors to have full admin access to namespace in Non-Production, and to view clusters in both Production and Non-Productioneditor
member
namespace.edit, cluster.viewnon-production
viewer.prodAllows the viewer group to have read-only access to clusters and namespaces in both Production and Non-Productionviewernamespace.view, cluster.viewnon-production
viewer.nonprodAllows the viewer group to have read-only access to clusters and namespaces in Non-Productionviewer
member
namespace.view, cluster.viewnon-production
secretsviewer.prodAllows the secrets-viewer-production group to have read-only access to secrets in Productionsecretsviewer-prodsecrets.viewproduction
secretsviewer.nonprodAllows the secretsviewer-nonprod group to have read-only access to secrets in Non-Productionsecretsviewer-nonprodsecrets.viewnon-production
supportAllows the troubleshooting group to Exec into and view logs for containers in Non-Production clusters onlytroubleshootingnamespace.troubleshootingnon-production