Role-Based Access Control
This demo showcases RBAC authorization with namespace-scoped permissions, matching the AgentCube authorization model where users can only access resources in their own namespaces.
1. Role Definitions
Predefined roles with different permission levels. Roles are bound to users in specific namespaces.
Admin
Full accessAll verbs on all resources in all namespaces
Developer
Read/Writeget, list, create, update, delete on all resources
Viewer
Read-onlyget, list on all resources
2. Create Role Binding
Bind a role to a user in a specific namespace. This grants the user the permissions defined by the role, scoped to that namespace.
Active Bindings
3. Test Authorization
Test whether a user has permission to perform an action on a resource in a specific namespace. The authorization engine evaluates all role bindings and returns an allow or deny decision.
4. Permission Matrix
View all permissions for a user in a namespace. Green indicates allowed, red indicates denied.
| Resource | get | list | create | update | delete | connect |
|---|
Authorization Decision Flow
AgentCube Authorization Model
AgentCube implements namespace-scoped authorization where:
- All users are ServiceAccounts
- Users can only access resources in their namespace
- No user has administrative privileges across namespaces
- Authorization is checked via checkSandboxAccess() function
- Default policy: Deny by default (fail-secure)