End of Sale Notice:

F5 NGINX is announcing the End of Sale (EoS) for NGINX Controller API Management Module, effective January 1, 2024.

F5 maintains generous lifecycle policies that allow customers to continue support and receive product updates. Existing NGINX Controller API- Management customers can continue to use the product past the EoS date. License renewals are not available after September 30, 2024.

See our End of Sale announcement for more details.
End of Sale Notice:

F5 NGINX is announcing the End of Sale (EoS) for NGINX Controller Application Delivery Module, effective January 1, 2024.

F5 maintains generous lifecycle policies that allow customers to continue support and receive product updates. Existing NGINX Controller Application Delivery customers can continue to use the product past the EoS date. License renewals are not available after September 30, 2024.

See our End of Sale announcement for more details.

Manage Roles and Role Groups

Create and manage Roles and Role Groups.

Overview

This topic explains how to create and manage Roles and Role Groups.

  • Roles define a set of permissions that allow or prevent Users from performing operations in F5 NGINX Controller or in an Environment.

  • Role Groups act as a collection of Roles that you can manage as a single resource. All members of a Role Group are assigned the same set of Roles. Role Groups can be mapped only to external auth provider groups; they can not be assigned to local users.

Predefined Roles and Role Groups

NGINX Controller provides the following predefined Roles and Role Groups:

Role Role Group Permissions Details
admin admin_group Full The predefined admin Role and admin_group Role Group have full permissions for all Environments and can publish API Definitions.
user user_group Write The predefined user Role and user_group Role Group have write access to Environments and can publish API Definitions.
guest guest_group Read-Only The predefined guest Role and guest_group Role Group have read-only access to Environments and cannot publish API Definitions.
Important:
Beginning in NGINX Controller 3.12, users no longer need to have one of the predefined roles. Users are granted a basic set of READ permissions for Analytics, Users, Roles, and Licenses. Users without a built-in role no longer have the implicit READ permissions for all Environments, Identity Providers, API Definitions, Locations, Providers, and Integrations. You can use the /platform/roles endpoint in the NGINX Controller REST API to extend or narrow a role’s set of permissions.

Permissions

Permissions are based on the API namespace. Permissions are implicit deny, that is, a permission is denied unless the user or group is explicitly allowed to perform the permission.

The four permission levels are:

  • FULL - can create, modify, and delete resources
  • WRITE - can create and modify resources, but can’t delete
  • READ - can get info about a resource
  • NONE - no access

By default, all users have READ permissions for Analytics, Users, Roles, and Licenses.

Tip:
You can use the /platform/roles endpoint in the NGINX Controller REST API to extend this default set of permissions.

Example: Inheriting Permissions

Whether for a collection or a specific resource instance, each permission contains a path to a resource and a permission level. Resources that are deeper in the path hierarchy inherit permissions from their parents unless explicitly overwritten. Refer to the NGINX Controller API Reference Guide for the resource paths.

In this example, all resources under /services/environments/ inherit READ access:

{
     "access": "READ",
     "path": "/services/environments/"
}

Requests made to the following endpoints are treated as such:

  • /services/environments/test - READ
  • /services/environments/staging - READ
  • /services/environments/test/apps/cart - READ
  • /services/environments/staging/apps/register - READ

Example: Overriding Inherited Permissions

In this example, the test Environment is expressly denied access, overwriting the READ access set at the parent level:

{
     "access": "READ",
     "path": "/services/environments/"
},
{
     "access": "NONE",
     "path": "/services/environments/test"
}

Requests made to the following endpoints are treated as such:

  • /services/environments/test - DENY
  • /services/environments/staging - READ
  • /services/environments/test/apps/cart - DENY
  • /services/environments/staging/apps/register - READ

Understanding a Role’s Permissions

When you view the details for a Role, you can see the Role’s permissions for the NGINX Controller settings and Environments.

The following table shows how to evaluate the permissions list. Permissions are applied in order of specificity. A wildcard (*) in a path is more specific than no information, and a resource name in a path is more specific than a wildcard.

Path Role Permission Explanation
/ admin, user FULL Full access to all exposed endpoints, except for endpoints that are explicitly denied.
/ guest READ Read-only access to all exposed endpoints, except for endpoints that are explicitly denied or allowed write access.
/platform/users/ user READ Read-only access to the collection of users. This role can view other user accounts but cannot create new users.
/platform/users/*/ user WRITE Write access to update existing users; for example, users can update their user accounts.
/platform/global/ guest NONE No access to view or update the global settings for NGINX Controller.

Overlapping Role Assignments

When users are assigned to multiple overlapping Roles, permissions are determined as follows:

  • The most specific restriction wins.
  • The least permissive restriction breaks a tie.

So, for example, if you’re adding a user to a Role that grants WRITE access to the Production Environment, and you add the same user to another Role that grants READ access to Production, the user will have READ access, that is, the least permissive restriction.

Tip:
When assigning Roles or Role Groups for users, you should assign the least permissive Role needed for users to complete their tasks.

Create a Role

Note:

Roles must belong to Environments. If you don’t already have an Environment, or you don’t want to place your new Role(s) in your existing Environment, you should create a new Environment before you continue.

The /platform/roles endpoint in the NGINX Controller REST API allows more freedom when creating roles. You can use the Roles API to grant permissions outside of environments, for example to /reports/.

Take the following steps to create a Role:

  1. Open the NGINX Controller user interface and log in.
  2. Select the NGINX Controller menu icon, then select Platform.
  3. On the Platform menu, select Roles.
  4. On the Create Role page, provide the name, description, and tags for the new Role.
  5. In the Environment Name list, select the Environment that the Role applies to.
  6. In the Permission Level list, select the desired permission level for the Role.
  7. Select Create to add the Role.

View, Edit, or Delete a Role

Take the following steps to view, edit, or delete a Role:

Note:
The predefined Roles admin, user, and guest cannot be edited or deleted.
  1. Open the NGINX Controller user interface and log in.
  2. Select the NGINX Controller menu icon, then select Platform.
  3. On the Platform menu, select Roles.
  4. On the Roles menu, select Roles Overview.
  5. To view the permissions details for a Role, choose the Role from the list. This opens a side panel with the Role’s permissions.
  6. To edit a Role, choose the Role from the list, then select Edit (pencil icon).
  7. To delete a Role, choose the Role from the list, then select Delete (trash icon).

Create a Role Group

Take the following steps to create a Role Group:

  1. Open the NGINX Controller user interface and log in.

  2. Select the NGINX Controller menu icon, then select Platform.

  3. On the Platform menu, select Roles.

  4. On the Roles menu, select Create Role Group.

  5. On the Roles Create Group page, provide the following settings:

    1. Add a name for the Role Group.
    2. (Optional) Add a display name.
    3. (Optional) Add a description.
    4. Select one or more of the available Roles to add to the Role Group, or select Create New to create a new Role to add.
  6. Select Save to add the Role Group.

View, Edit, or Delete a Role Group

Take the following steps to view, edit, or delete a Role Group:

Note:
The predefined Role Groups admin_group, user_group, and guest_group cannot be edited or deleted.
  1. Open the NGINX Controller user interface and log in.
  2. Select the NGINX Controller menu icon, then select Platform.
  3. On the Platform menu, select Roles.
  4. On the Roles menu, select Role Groups Overview.
  5. To view the details for a Role Group, including the assigned permissions, choose the Role Group from the list. This opens a side panel with the Role Group’s details.
  6. To edit a Role Group, choose the Role Group from the list, then select Edit (pencil icon).
  7. To delete a Role Group, choose the Role Group from the list, then select Delete (trash icon).

What’s Next