Skip to content

Multi-Tenancy & RBAC

Kube-DC implements a comprehensive multi-tenant architecture that leverages Kubernetes namespaces and Keycloak for identity and access management. This document explains how organizations, projects, and groups in Kube-DC are mapped to Kubernetes and Keycloak objects.

Core Components and Mapping Structure

The following diagram illustrates the mapping between Kube-DC structures and the underlying Kubernetes and Keycloak components:

graph TD
    User[User 1] -->|Authenticates| KC[Keycloak Realm]
    User -->|Obtains Group and Role| KCG[Keycloak Group]
    User -->|Obtains Group and Role| KCR[Keycloak Role]

    ORG[Organization] -->|Maps to| ORGNS[Organization Namespace]

    ORGNS -->|Contains| ORGGRP[Organization Group]

    PROJ[Project A] -->|Maps to| PNS[Project A NS]
    PROJ2[Project B] -->|Maps to| PNS2[Project B NS]

    ORGGRP -->|Maps to| K8GRPCRD[Group CRD]
    ORGGRP -->|Maps to| KCGRP[Keycloak Group]

    KCGRP -->|Maps to| K8SROLE[K8s RoleBinding]
    KCR -->|Maps to| K8SROLE

    K8GRPCRD -->|Defines permissions for| PNS
    K8GRPCRD -->|Defines permissions for| PNS2

    KK[Keycloak Client Role] -->|KK to K8s Role Mapping| K8R[K8s Role]

Organization Structure

Organization

An Organization is the top-level entity in Kube-DC that represents a company, department, or team.

Example Organization YAML:

apiVersion: kube-dc.com/v1
kind: Organization
metadata:
  name: shalb
  namespace: shalb
spec: 
  description: "Shalb organization"
  email: "arti@shalb.com"

Mapping:

  • Each Organization maps to a dedicated Kubernetes namespace with the same name
  • A corresponding Keycloak Client is created for the organization
  • The Organization serves as a logical grouping for Projects and OrganizationGroups

Project

A Project represents a logical grouping of resources within an Organization. Projects help segregate workloads and manage access control.

Example Project YAML:

apiVersion: kube-dc.com/v1
kind: Project
metadata:
  name: demo
  namespace: shalb
spec:
  cidrBlock: "10.0.10.0/24"

Mapping:

  • Each Project maps to a dedicated Kubernetes namespace in the format: {organization}-{project} (e.g., shalb-demo)
  • Projects receive their own network CIDR block for resource isolation
  • Kubernetes namespaces provide the boundary for resource quotas and access control

OrganizationGroup

An OrganizationGroup maps users to roles within specific projects, defining what actions they can perform.

Example OrganizationGroup YAML:

apiVersion: kube-dc.com/v1
kind: OrganizationGroup
metadata:
  name: "app-manager"
  namespace: shalb
spec:
  permissions:
  - project: "demo"
    roles:
    - admin
  - project: "prod"
    roles:
    - resource-manager

Mapping:

  • OrganizationGroups are implemented as Kubernetes Custom Resource Definitions (CRDs)
  • Each OrganizationGroup maps to a Keycloak Group
  • The permissions defined in OrganizationGroups determine the Kubernetes RoleBindings that grant access to resources
  • Different roles can be assigned for different projects

Authentication and Authorization Flow

User Authentication:

  • Users authenticate through Keycloak
  • Upon successful authentication, users receive JSON Web Tokens (JWTs)

Group and Role Assignment:

  • Users are assigned to Keycloak Groups based on their OrganizationGroup membership
  • Keycloak maps these groups to corresponding roles

Kubernetes Authorization:

  • The Kubernetes API server validates the user's JWT
  • RoleBindings determine what actions the user can perform within each namespace
  • Resource access is controlled at the Project (namespace) level

Resource Access:

  • Users can only access resources in projects where they have appropriate role assignments
  • Actions are restricted based on the permissions defined in their roles

Role-Based Access Control

Kube-DC provides several built-in roles that can be assigned to users via OrganizationGroups:

  • Admin: Full access to all resources within a project
  • Resource Manager: Can create and manage resources, but cannot modify project settings
  • Viewer: Read-only access to project resources

Example Role YAML:

apiVersion: kube-dc.com/v1
kind: Role
metadata:
  name: resource-manager
  namespace: shalb
spec:
  rules:
  - apiGroups: ["*"]
    resources: ["pods", "services", "deployments", "statefulsets"]
    verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
  - apiGroups: ["kubevirt.io"]
    resources: ["virtualmachines", "virtualmachineinstances"]
    verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]

Implementation Details

Kubernetes Components

  • Namespaces: Used to isolate Organizations and Projects
  • RBAC: Role-Based Access Control for managing permissions
  • CRDs: Custom Resource Definitions for Kube-DC specific resources
  • NetworkPolicies: Ensure network isolation between Projects

Keycloak Integration

  • Realm: Represents the authentication domain
  • Clients: Each Organization has a dedicated client
  • Groups: Map to OrganizationGroups in Kube-DC
  • Roles: Define permissions that can be assigned to users
  • Role Mappings: Connect Keycloak roles to Kubernetes RBAC

Practical Application

When a user is added to an organization group in Kube-DC:

  1. The corresponding Keycloak group membership is created
  2. The user inherits roles based on the group's permissions
  3. When the user accesses the Kubernetes API, their JWT contains the group and role information
  4. Kubernetes RBAC evaluates the JWT against RoleBindings to determine access
  5. The user can operate only within the boundaries of their assigned permissions

This multi-layered approach ensures secure isolation between tenants while providing fine-grained access control within each project.