ECP implements RBAC (Role-Based Access Control) for access control. System administrator assigns roles to users, granting them specific permissions for resource access, which simplifies the complexity of permission management, making it more secure and easier to control.
Roles and Permissions
ECP users are divided into four levels of roles to meet the permission requirements of enterprise customers and simplify the process of assigning role permissions. Each role in ECP has a subset of permissions from the role above it.
System admin > Organization admin > Project admin > Regular users
The role hierarchy is as follows:
System Admin: Top-tier role with full permissions, granted by system admins, and can grant permissions to other roles, including system/organization/project admins, or regular users.
The first system admin (superuser) is created when installing ECP, for details, see Installing ECP on Kubernetes - Creating Superuser.
Organization Admin: Top-tier role within an organization, having full permissions. This role can grant permissions within its organization but cannot do so across different organizations.
Project Admin: Top-tier role within a project, having full permissions, granted by system/organization admins. This role can grant permissions within its project but cannot do so across different projects.
Regular User: Regular users can be added or invited to the organization by system/organization/project admins. They have viewing permissions for authorized projects.
You can refer to the table below for a comprehensive overview of role permissions:
In ECP, users can be granted roles during their creation process. As a system admin, you can log in and access the Users page under the Administration tab. From there, click on Create User (or Invite User). Complete the necessary settings and assign the user as either an admin or a regular user.
For users that have already been created, you can modify their role assignment by clicking the edit icon under the Action column of the specific user. This allows you to adjust their permissions and assign them as either administrators or regular users based on your requirements.