RBAC and Permissions
Careful! You are browsing documentation for an outdated version of Kong Enterprise. Go here
to browse the documentation for the latest version.
Estimated reading time:
RBAC in Kong Manager
In addition to verifying users and distinguishing Workspaces, Kong Enterprise has the ability to enforce role-based access control (RBAC) for all resources. For the Super Admin (or any role with read and write access to /admins and /rbac), this ability entails permission to create new roles and customize permissions.
Kong includes Role-Based Access Control (RBAC). Every admin using Kong Manager will need an assigned Role based on the resources they have permission to access.
When a Super Admin starts Kong for the first time, the default Workspace will include three default Roles: read-only, admin, and super-admin. The three Roles have permissions related to every Workspace in the cluster.
Similarly, if a Role is confined to certain Workspaces, the user assigned to it will not be able to see either the overview or links to other Workspaces.
⚠️ IMPORTANT: Although a default admin has full permissions with every endpoint in Kong, only a Super Admin has the ability to assign and modify RBAC permissions. An admin is not able to modify their own permissions or delimit a Super Admin’s permissions.
⚠️ IMPORTANT: If a Role does not have permission to access entire endpoints, the user assigned to the Role will not be able to see the related navigation links.
For more information about RBAC Roles in Kong Enterprise as a whole, see the RBAC Overview
RBAC in Workspaces
RBAC Roles and permissions will be specific to a Workspace if they are assigned from within one. For example, if there are two Workspaces, “Payments” and “Deliveries”, an Admin created in “Payments” will not have access to any endpoints in “Deliveries”.
When a Super Admin creates a new Workspace, there are three default Roles that mirror the cluster-level Roles, and a fourth unique to each Workspace: workspace-read-only, workspace-admin, workspace-super-admin, and
⚠️ IMPORTANT: Any Role assigned in the “Default” Workspace will have permissions applied to all subsequently created Workspaces. A Super Admin in “Default” has RBAC permissions across all Workspaces.
How to Create RBAC Roles for Admins in the New Workspace
On the “Admins” page, to create a new Role, click the “Add Role” button at the top right of the list of Roles.
On the “Add Role” form, name the Role according to the permissions you want to grant. Write a brief comment describing the permissions of the Role.
Click the “Add Permissions” button and fill out the form. Add the endpoint permissions by marking the appropriate checkbox.
Click “Add Permission to Role” to see the permissions listed on the form.
To forbid access to certain endpoints, click “Add Permission” again and use the “negative” checkbox.
See the new Role appear on the “Admins” page
⚠️ IMPORTANT: Every Admin who needs access to Kong Manager will need at least read access to the home “/” endpoint.
⚠️ IMPORTANT: A negative permission will always take precedence over a positive one.