Roles and Permissions When SSO Is Configured

Describes the roles supported by the HPE Ezmeral Data Fabric in SSO-enabled clusters.

SSO-configured clusters support the following roles:
Role Permissions ACL Permission Code
Developer (fabric user) Readonly and create volume permission login, cv, cp
Infrastructure Admin Permission to log in and start or stop services login, ss
Fabric Manager Full control of the cluster login, cv, cp, fc

When SSO is not configured, Data Fabric clusters implement permissions through cluster-level access control lists (ACLs). See Creating Cluster-Level ACLs.

When SSO is configured, Data Fabric relies on the roles defined in the JSON web token (JWT). For example:
  "userRoles": [ 
    "default-roles-user46", 
    "offline_access", 
    "admin", 
    "developer", 
    "uma_authorization", 
    "cluster-admin" 
  ], 
The LDAP administrator configures these roles when a user is added to LDAP. The roles are then passed into the JWT. You can view the role permissions by issuing the maprlogin print command:
maprlogin print
testcluster: user = mapr, created = 'Fri Mar 10 02:10:34 PST 2023', expires = 'Fri Mar 10 02:30:34 PST 2023', RenewalTill = 'Fri Mar 10 02:30:34 PST 2023', 
uid = 5000, gids = 5000, 5001, CanImpersonate = true, CanGenerateTicket = false, isExternal = true, isRemoteTempTicket = false, capabilities = [login, cv, a, fc] 

Data Fabric honors permissions embedded in the JWT first and then honors permissions in cluster-level ACLs.