-
Notifications
You must be signed in to change notification settings - Fork 0
Description
At time of writing, we must directly associate JupyterHub users with JupyterHub roles to support RBAC. Those roles are then associated with JupyterHub services (ie OAuth2 clients) to grant users authenticated access to the applications' underlying services (see JupyterHub RBAC - Roles: Defining Roles).
eoapi-risk/deploy/helm/jupyterhub/values.yaml
Lines 70 to 78 in b3912f5
| loadRoles: | |
| eoapi_user: | |
| description: Users allowed to access eoAPI | |
| users: | |
| - alukach | |
| services: | |
| - eoapi | |
| scopes: | |
| - access:services |
This is a bit of an onerous task and won't scale well for systems with large user bases. Instead, a more elegant solution would be to grant groups access to the JupyterHub Applications. Ideally, users would then be automatically assigned to groups based on information associated with their identity as specified by the identity provider (ie GitHub, perhaps this could be based on membership of a GitHub group?) I'm admittedly not sure as to what the capabilities are for this within JupyterHub. For reference, Grafana has a nice system allowing the use of JMES expressions to assign users to groups upon login (docs).