Kyndryl Bridge

Experience Kyndryl Bridge

Roles and permissions
Published On Nov 05, 2024 - 8:02 AM

Roles and permissions

Learn which permissions are required to execute specific actions within Kyndryl Bridge services.

System settings

Support

Permission name
Description
Roles related to
feedback.brokers-repos.view
Allow to view service broker repos
Administrator
feedback.brokers-settings.create
Allow to create service broker settings
Administrator
feedback.brokers-settings.delete
Allow to delete existing service broker settings
Administrator
feedback.brokers-settings.update
Allow to update existing service broker settings
Administrator
feedback.brokers-settings.view
Allow to view service broker settings
Administrator
feedback.issues.create
Allow to create issue
Administrator
feedback.issues.delete
Allow to delete existing issue
Administrator
feedback.issues.update
Allow to update existing issue
Administrator
feedback.issues.view
Allow to view issues
Administrator

IAM: User invitations

Permission name
Description
Roles related to
accounts.user.reinvite
Allow to reinvite the account initial user
  • Administrator
  • Editor
iam.invitations.create
Allow to create invitations
Administrator
iam.invitations.delete
Allow to delete invitations
  • Administrator
  • Editor
iam.invitations.resend
Allow to resend pending invitations
  • Administrator
  • Editor
iam.invitations.update
Allow to update invitations
  • Administrator
  • Editor
iam.invitations.view
Allow to view invitations
  • Administrator
  • Editor
iam.organization.bulkdelete
Allow to delete multiple organizations
  • Administrator
  • Editor
iam.organization.create
Allow to create new organization
  • Administrator
  • Operator
  • Viewer
iam.organization.invite
Allow to invite new user to an organization
  • Administrator
  • Editor
iam.organization.view
Allow to view an organization
  • Administrator
  • Editor

IAM: Resources and users

Permission name
Description
Roles related to
iam.resourceattributes.view
Allow to view resources
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.resourceattributesvalues.view
Allow to view resources attribute values
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.resourcegroups.view
Allow to view resource groups
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.usergroups.view
Allow to view user groups
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.usermapping.update
Allow to update user mapping assertions
  • Administrator
  • Editor
iam.users-lastoperation.view
Allow to view last operation performed for an user
  • Administrator
  • Editor
iam.users.bulkdelete
Allow to delete multiple users
  • Administrator
  • Editor
iam.users.create
Allow to create the users
Administrator
iam.users.delete
Allow to delete the users
  • Administrator
  • Editor
iam.users.update
Allow to update the users
  • Administrator
  • Editor
iam.users.view
Allow to view the users
  • Administrator
  • Editor

Account, Roles, and Permissions

Permission name
Description
Roles related to
fileserver.files.view
Allow to view files
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.accounts.create
Allow to create a new account
Administration
iam.accounts.delete
Allow to delete accounts
  • Administrator
  • Editor
iam.accounts.update
Allow to update an account
  • Administrator
  • Editor
iam.accounts.view
Allow to view accounts
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.brokers.delete
Allow to delete broker
  • Administrator
  • Editor
iam.brokers.register
Allow to register new broker
  • Administrator
  • Editor
iam.brokers.test
Allow to test brokers
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.brokers.view
Allow to view brokers
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.businessservices.view
Allow to view business services
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.catalogs.view
Allow to view catalogs
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.customrole.create
Allow to create a custom role
Administrator
iam.customrole.delete
Allow to delete a custom role
  • Administrator
  • Editor
iam.customrole.update
Allow to update a custom role
  • Administrator
  • Editor
iam.customrole.view
Allow to view custom roles
  • Administrator
  • Editor
  • Operator
  • Viewer

IAM: Service IDs

Permission name
Description
Roles related to
iam.serviceids.create
Allow to create serviceids
Administrator
iam.serviceids.delete
Allow to delete serviceids
  • Administrator
  • Editor
iam.serviceids.update
Allow to update serviceids
  • Administrator
  • Editor
iam.serviceids.view
Allow to view serviceids
  • Administrator
  • Editor
  • Operator
  • Viewer

IAM: SMTP

Permission name
Description
Roles related to
iam.smtp.create
Allow to create smtp config
Administrator
iam.smtp.delete
Allow to delete smtp config
  • Administrator
  • Editor
iam.smtp.view
Allow to view smtp config
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.spmetadata.view
Allow to view SAML SP metadata
  • Administrator
  • Editor
  • Operator
  • Viewer

IAM: IDP

Permission name
Description
Roles related to
iam.idp-metadata.view
Allow to view identity provider metadata
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.idp.create
Allow to create identity provider
Administrator
iam.idp.delete
Allow to delete identity provider
  • Administrator
  • Editor
iam.idp.replace
Allow to replace fields of an identity provider
  • Administrator
  • Editor
iam.idp.update
Allow to update an identity provider
  • Administrator
  • Editor
iam.idp.view
Allow to view an identity provider
  • Administrator
  • Editor
  • Operator
  • Viewer

IAM: API Keys, Key values, and Tokens

Permission name
Description
Roles related to
iam.apikeys.create
Allow to create api keys
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.apikeys.delete
Allow to delete existing api keys
  • Administrator
  • Editor
  • Operator
iam.apikeys.manage
Allow to manage api keys
  • Administrator
  • Editor
iam.apikeys.replace
Allow to replace existing api keys
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.apikeys.update
Allow to patch existing api keys
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.apikeys.view
Allow to view api keys
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.tokens.create
Allow to create a token
Administrator
iam.tokens.delete
Allow to delete a token
  • Administrator
  • Editor
iam.tokens.replace
Allow to replace a token
  • Administrator
  • Editor
iam.tokens.update
Allow to update a token
  • Administrator
  • Editor
iam.tokens.view
Allow to view tokens
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.keyvalues.create
Allow to add key-value
Administrator
iam.keyvalues.delete
Allow to delete key-value
  • Administrator
  • Editor
iam.keyvalues.update
Allow to update key-value
  • Administrator
  • Editor
iam.keyvalues.view
Allow to view key-value
  • Administrator
  • Editor
  • Operator
  • Viewer

IAM: Access Tags

Permission name
Description
Roles related to
iam.accesstags.create
Allow to add accesstags
Administrator
iam.accesstags.delete
Allow to delete accesstags
  • Administrator
  • Editor
iam.accesstags.update
Allow to update accesstags
  • Administrator
  • Editor
  • Operator
iam.accesstags.view
Allow to view accesstags
  • Administrator
  • Editor
  • Operator
  • Viewer

IAM: Access Groups and Access Policies

Permission name
Description
Roles related to
iam.accessgroups-members.add
Allow to add members to access group
  • Administrator
  • Editor
iam.accessgroups-members.delete
Allow to delete accessgroup member
  • Administrator
  • Editor
iam.accessgroups-members.view
Allow to view access group members
  • Administrator
  • Editor
iam.accessgroups-rules.add
Allow to add rules to access group
  • Administrator
  • Editor
iam.accessgroups-rules.delete
Allow to delete access group rules
  • Administrator
  • Editor
iam.accessgroups-rules.view
Allow to view access group rules
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.accessgroups.create
Allow to create accessgroup
Administrator
iam.accessgroups.delete
Allow to delete accessgroup
  • Administrator
  • Editor
iam.accessgroups.update
Allow to update access group
  • Administrator
  • Editor
  • Operator
iam.accessgroups.view
Allow to view access groups
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.authzpolicy.create
Allow to create new authorization policies
Administrator
iam.authzpolicy.delete
Allow to delete authorization policies
  • Administrator
  • Editor
iam.authzpolicy.update
Allow to update authorization policies
  • Administrator
  • Editor
iam.authzpolicy.view
Allow to view authorization policies
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.policies.view
Allow to view policies
  • Administrator
  • Editor
  • Operator
  • Viewer

Connections, Notifications, and Metering

Permission name
Description
Roles related to
iam.connections.create
Allow to create connections
Administrator
iam.connections.delete
Allow to delete connections
  • Administrator
  • Editor
iam.connections.test
Allow to test connections
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.connections.update
Allow to update connections
  • Administrator
  • Editor
iam.connections.view
Allow to view connections
  • Administrator
  • Editor
  • Operator
  • Viewer
metering.brokersusage.view
Allow to view service broker usage
  • Administrator
  • Editor
  • Operator
  • Viewer
metering.meter.view
Allow to view metering details
  • Administrator
  • Editor
  • Operator
  • Viewer
metering.resetcosa.create
Allow to reset cosa state
  • Administrator
  • Editor
  • Operator
  • Viewer
metering.tenantmeter.view
Allow to view tenant specific metering details
  • Administrator
  • Editor
  • Operator
  • Viewer
metering.tenantsusage.view
Allow to view tenant specific metering usage
  • Administrator
  • Editor
  • Operator
  • Viewer
metering.usage.download
Allow to download metering data
  • Administrator
  • Editor
  • Operator
  • Viewer
metering.usage.view
Allow to view metering usage
  • Administrator
  • Editor
  • Operator
  • Viewer
notification.emailsettings.create
Allow to create notification emailsettings
  • Administrator
  • Editor
  • Operator
  • Viewer
notification.emailsettings.delete
Allow to delete notification emailsettings
  • Administrator
  • Editor
  • Operator
  • Viewer
notification.emailsettings.update
Allow to update notification emailsettings
  • Administrator
  • Editor
  • Operator
  • Viewer
notification.emailsettings.view
Allow to view notification emailsettings
  • Administrator
  • Editor
  • Operator
  • Viewer
notification.inapp.create
Allow to create inapp notification
  • Administrator
  • Editor
  • Operator
  • Viewer
notification.inapp.delete
Allow to delete inapp notification
  • Administrator
  • Editor
  • Operator
  • Viewer
notification.inapp.update
Allow to update inapp notification
  • Administrator
  • Editor
  • Operator
  • Viewer
notification.inapp.view
Allow to view inapp notification
  • Administrator
  • Editor
  • Operator
  • Viewer
notification.template.create
Allow to create notification template
  • Administrator
  • Editor
  • Operator
  • Viewer
notification.template.delete
Allow to delete notification template
  • Administrator
  • Editor
  • Operator
  • Viewer
notification.template.put
Allow to put notification template
  • Administrator
  • Editor
  • Operator
  • Viewer
notification.template.update
Allow to update notification template
  • Administrator
  • Editor
  • Operator
  • Viewer
notification.template.view
Allow to view notification template
  • Administrator
  • Editor
  • Operator
  • Viewer
security.connections.create
Allow to create connections
  • Administrator
  • Operator
security.connections.delete
Allow to delete connections
  • Administrator
  • Editor
  • Operator
security.connections.link
Allow to link shared connections
  • Administrator
  • Editor
  • Operator
security.connections.replace
Allow to replace connections
  • Administrator
  • Editor
  • Operator
security.connections.test
Allow to test connections
  • Administrator
  • Editor
  • Operator
security.connections.update
Allow to update connections
  • Administrator
  • Editor
  • Operator
security.connections.view
Allow to view connections
  • Administrator
  • Editor
  • Operator
  • Viewer
security.connectionstatus.view
Allow to get test connection status
  • Administrator
  • Editor
  • Operator
  • Viewer
security.connectiontypes.create
Allow to add/update connectiontypes for a client tenant
Administrator
security.connectiontypes.delete
Allow to delete connection types for a client tenant
  • Administrator
  • Editor
security.connectiontypes.view
Allow to view connectiontypes for a client tenant
  • Administrator
  • Editor

Tenant settings

iam.tenant-activitylogs.view
Allow to view activity logs for a tenant
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.tenant-entitlements.update
Allow to update tenant entitlements
  • Administrator
  • Editor
iam.tenant-entitlements.view
Allow to view tenant entitlements
  • Administrator
  • Editor
iam.tenant-membership.add
Allow to add the tenant level roles of the users
  • Administrator
  • Editor
iam.tenant-membership.remove
Allow to remove the tenant level roles of the users
  • Administrator
  • Editor
iam.tenant-opssettings.view
Get Ops Settings
  • Administrator
  • Editor
iam.tenant-owner.update
Allow to update tenant owner
  • Administrator
  • Editor
iam.tenant-settings.update
Allow to update tenant settings
  • Administrator
  • Editor
iam.tenant-settings.view
Allow to view tenant settings
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.tenant.bindinginfo.view
Allow to view binding info
  • Administrator
  • Editor
iam.tenant.create
Allow to create new tenant
Administrator
iam.tenant.delete
Allow to delete a tenant
  • Administrator
  • Editor
iam.tenant.modify
Allow to modify a tenant
  • Administrator
  • Editor
iam.tenant.update
Allow to update a tenant
  • Administrator
  • Editor
iam.tenant.view
Allow to view tenants
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.tenantidp.create
Allow to create tenant manager level identity provider
Administrator
iam.tenantidp.delete
Allow to delete tenant manager level identity provider
  • Administrator
  • Editor
iam.tenantidp.replace
Allow to replace fields of tenant manager level identity provider
  • Administrator
  • Editor
iam.tenantidp.update
Allow to update fields of tenant manager level identity provider
  • Administrator
  • Editor
iam.tenantidp.view
Allow to view tenant manager level identity provider
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.tenants-globalfeatureflags.update
Allow to update tenant featureflags
  • Administrator
  • Editor
iam.tenants-opssettings.update
Allow to update tenant opssettings
  • Administrator
  • Editor
iam.tenants-opssettings.view
Allow to view tenant opssettings
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.tm-invitations.create
Allow to create tenant manager level invitations
Administrator
iam.tm-invitations.delete
Allow to delete tenant manager level invitations
  • Administrator
  • Editor
iam.tm-invitations.update
Allow to update tenant manager invitations
  • Administrator
  • Editor
iam.tm-invitations.view
Allow to view tenant manager level invitations
  • Administrator
  • Editor
iam.dcphost.view
Allow to retrive the dcp base host based on region
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.delegatedtoken.create
Allow to create delegated token
Administrator
iam.dns.view
Allow to view dns
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.domains.view
Allow to view domains
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.globalidp.view
Allow to view global identity providers
  • Administrator
  • Editor
  • Operator
  • Viewer
iam.identity.unlink
Allow to unlink the user identity
  • Administrator
  • Editor
iam.oidcapp.create
Allow to create OIDC application
Administrator
iam.oidcapp.delete
Allow to delete OIDC application
  • Administrator
  • Editor
iam.oidcapp.replace
Allow to replace OIDC application
  • Administrator
  • Editor
iam.oidcapp.update
Allow to update OIDC application
  • Administrator
  • Editor
iam.oidcapp.view
Allow to view OIDC application
  • Administrator
  • Editor
  • Operator
  • Viewer

Audit

Permission name
Description
Roles related to
audit.records.download
Allow to download audit records
  • Administrator
  • Editor
audit.records.view
Allow to view audit records
  • Administrator
  • Editor
iam.audit.delete
Allow to delete audit
  • Administrator
  • Editor
iam.audit.replace
Allow to replace audit
  • Administrator
  • Editor
iam.audit.view
Allow to view audit
  • Administrator
  • Editor
  • Operator
  • Viewer

Common Services

Common Discovery

Permission name
Description
Roles related to
common-discovery.account.view
Allow to view inventory accounts
  • Administrator
  • Editor
  • Operator
  • Viewer
common-discovery.actions.admin
Allow to onboard actions
Administrator
common-discovery.actions.execute
Allow to execute actions
  • Administrator
  • Operator
common-discovery.actions.view
Allow to view inventory actions
  • Administrator
  • Editor
  • Operator
  • Viewer
common-discovery.category.view
Allow to view inventory records' category
  • Administrator
  • Editor
  • Operator
  • Viewer
common-discovery.location.view
Allow to view inventory records' location
  • Administrator
  • Editor
  • Operator
  • Viewer
common-discovery.service.view
Allow to view inventory records
  • Administrator
  • Editor
  • Operator
  • Viewer
common-discovery.tags.edit
Allow to edit/add/delete inventory resources tags
  • Administrator
  • Editor
common-discovery.tags.view
Allow to view import tags jobs for inventory resources
  • Administrator
  • Editor

Common Actions

Permission name
Description
Roles related to
actions.action_category.view
Allow to perform view operation on action category
  • Administrator
  • Editor
  • Operator
  • Viewer
  • Action viewer
  • Action Registry Admin
actions.action_definition.view
Allow to perform view operation on action definition
  • Administrator
  • Editor
  • Operator
  • Viewer
  • Action viewer
  • Action Registry Admin
actions.action_policy.view
Allow to perform view operation on action policy
  • Administrator
  • Editor
  • Operator
  • Viewer
  • Action viewer
  • Action Registry Admin
actions.action_provider.view
Allow to perform view operation on action provider
  • Administrator
  • Editor
  • Operator
  • Viewer
  • Action viewer
  • Action Registry Admin
actions.action_request.view
Allow to perform view operation on action request
  • Administrator
  • Editor
  • Operator
  • Viewer
  • Action viewer
  • Action Registry Admin
actions.action_stats.view
Allow to perform view operation on action stats
  • Administrator
  • Editor
  • Operator
  • Viewer
  • Action viewer
  • Action Registry Admin
actions.action_support.view
Allow to perform view operation on action support
  • Administrator
  • Editor
  • Operator
  • Viewer
  • Action viewer
  • Action Registry Admin
actions.action_types.view
Allow to perform view operation on action type
  • Administrator
  • Editor
  • Operator
  • Viewer
  • Action viewer
  • Action Registry Admin
actions.action_category.crud
Allow to perform crud operation on action category
  • Administrator
  • Editor
  • Action Regristry Admin
actions.action_definition.crud
Allow to perform crud operation on action definition
  • Administrator
  • Editor
  • Action Regristry Admin
actions.action_engine_api_manager.crud
Allow to perform crud operation on action enginer api manager
  • Administrator
  • Editor
  • Action Regristry Admin
actions.action_engine_practitioner.crud
Allow to perform crud operation on action engine practitioner
  • Administrator
  • Editor
  • Action Regristry Admin
actions.action_onboarding.crud
Allow to perform crud operation on action onboarding
  • Administrator
  • Editor
  • Action Regristry Admin
actions.action_policy.crud
Allow to perform crud operation on action policy
  • Administrator
  • Editor
  • Action Regristry Admin
actions.action_provider.crud
Allow to perform crud operation on action provider
  • Administrator
  • Editor
  • Action Regristry Admin
actions.action_request.crud
Allow to perform crud operation on action request
  • Administrator
  • Editor
  • Action Regristry Admin
actions.action_stats.crud
Allow to perform crud operation on action stats
  • Administrator
  • Editor
  • Action Regristry Admin
actions.action_support.crud
Allow to perform crud operation on action support
  • Administrator
  • Editor
  • Action Regristry Admin
actions.action_types.crud
Allow to perform crud operation on action types
  • Administrator
  • Editor
  • Action Regristry Admin

Topology

Permission name
Description
Roles related to
topology.impactanalysis-data.view
Allow to view impactanalysis
  • Administrator
  • Editor
  • Operator
  • Viewer
topology.topology-data.view
Allow to view topology data
  • Administrator
  • Editor
  • Operator
  • Viewer
topology.topology-metadata.view
Allow to view topology metadata
  • Administrator
  • Editor
  • Operator
  • Viewer
topology.topology-tags.view
Allow to view topology tags
  • Administrator
  • Editor
  • Operator
  • Viewer

Container Cluster Management

Permission name
Description
Roles related to
ccm.cluster-alerts.view
Allow to view alerts of a cluster
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.cluster-data.view
Allow to view cluster data
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.cluster.view
Allow to view cluster
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.clusters-alerts.view
Allow to view alerts of all clusters
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.clusters.view
Allow to view clusters
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.custom-views.create
Allow to create custom views
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.custom-views.delete
Allow to delete custom views
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.custom-views.update
Allow to update custom views
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.custom-views.view
Allow to view custom views
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.discovery-clusters.view
Allow to view discovery clusters
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.geo-locations.delete
Allow to delete geographical locations for clusters
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.geo-locations.edit
Allow to edit geographical locations for clusters
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.geo-locations.view
Allow to view geographical locations for clusters
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.geolocation-aggregates.view
Allow to view cluster geolocation aggregates
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.insights-recommendations.view
Allow to view Insights recommendations
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.kubernetes-clusterrole.create
Allow to create Kubernetes resource - ClusterRole
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-clusterrole.delete
Allow to delete Kubernetes resource - ClusterRole
Administrator
ccm.kubernetes-clusterrolebinding.create
Allow to create Kubernetes resource - ClusterRoleBinding
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-clusterrolebinding.delete
Allow to delete Kubernetes resource - ClusterRoleBinding
Administrator
ccm.kubernetes-configmap.create
Allow to create Kubernetes resource - ConfigMap
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-configmap.delete
Allow to delete Kubernetes resource - ConfigMap
Administrator
ccm.kubernetes-cronjob.create
Allow to create Kubernetes resource - CronJob
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-cronjob.delete
Allow to delete Kubernetes resource - CronJob
Administrator
ccm.kubernetes-customresourcedefinition.create
Allow to create Kubernetes resource - CustomResourceDefinition
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-customresourcedefinition.delete
Allow to delete Kubernetes resource - CustomResourceDefinition
Administrator
ccm.kubernetes-daemonset.create
Allow to create Kubernetes resource - DaemonSet
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-daemonset.delete
Allow to delete Kubernetes resource - DaemonSet
Administrator
ccm.kubernetes-deployment.create
Allow to create Kubernetes resource - Deployment
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-deployment.delete
Allow to delete Kubernetes resource - Deployment
Administrator
ccm.kubernetes-endpoints.create
Allow to create Kubernetes resource - Endpoints
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-endpoints.delete
Allow to delete Kubernetes resource - Endpoints
Administrator
ccm.kubernetes-endpointslice.create
Allow to create Kubernetes resource - EndpointSlice
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-endpointslice.delete
Allow to delete Kubernetes resource - EndpointSlice
Administrator
ccm.kubernetes-horizontalpodautoscaler.create
Allow to create Kubernetes resource - HorizontalPodAutoscaler
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-horizontalpodautoscaler.delete
Allow to delete Kubernetes resource - HorizontalPodAutoscaler
Administrator
ccm.kubernetes-ingress.create
Allow to create Kubernetes resource - Ingress
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-ingress.delete
Allow to delete Kubernetes resource - Ingress
Administrator
ccm.kubernetes-job.create
Allow to create Kubernetes resource - Job
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-job.delete
Allow to delete Kubernetes resource - Job
Administrator
ccm.kubernetes-limitrange.create
Allow to create Kubernetes resource - LimitRange
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-limitrange.delete
Allow to delete Kubernetes resource - LimitRange
Administrator
ccm.kubernetes-namespace.create
Allow to create Kubernetes resource - Namespace
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-namespace.delete
Allow to delete Kubernetes resource - Namespace
Administrator
ccm.kubernetes-networkpolicy.create
Allow to create Kubernetes resource - NetworkPolicy
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-networkpolicy.delete
Allow to delete Kubernetes resource - NetworkPolicy
Administrator
ccm.kubernetes-persistentvolume.create
Allow to create Kubernetes resource - PersistentVolume
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-persistentvolume.delete
Allow to delete Kubernetes resource - PersistentVolume
Administrator
ccm.kubernetes-persistentvolumeclaim.create
Allow to create Kubernetes resource - PersistentVolumeClaim
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-persistentvolumeclaim.delete
Allow to delete Kubernetes resource - PersistentVolumeClaim
Administrator
ccm.kubernetes-pod.create
Allow to create Kubernetes resource - Pod
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-pod.delete
Allow to delete Kubernetes resource - Pod
Administrator
ccm.kubernetes-poddisruptionbudget.create
Allow to create Kubernetes resource - PodDisruptionBudget
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-poddisruptionbudget.delete
Allow to delete Kubernetes resource - PodDisruptionBudget
Administrator
ccm.kubernetes-priorityclass.create
Allow to create Kubernetes resource - PriorityClass
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-priorityclass.delete
Allow to delete Kubernetes resource - PriorityClass
Administrator
ccm.kubernetes-replicaset.create
Allow to create Kubernetes resource - ReplicaSet
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-replicaset.delete
Allow to delete Kubernetes resource - ReplicaSet
Administrator
ccm.kubernetes-resource-types.view
Allow to view Kubernetes resource types list
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.kubernetes-resourcequota.create
Allow to create Kubernetes resource - ResourceQuota
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-resourcequota.delete
Allow to delete Kubernetes resource - ResourceQuota
Administrator
ccm.kubernetes-role.create
Allow to create Kubernetes resource - Role
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-role.delete
Allow to delete Kubernetes resource - Role
Administrator
ccm.kubernetes-rolebinding.create
Allow to create Kubernetes resource - RoleBinding
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-rolebinding.delete
Allow to delete Kubernetes resource - RoleBinding
Administrator
ccm.kubernetes-secret.create
Allow to create Kubernetes resource - Secret
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-secret.delete
Allow to delete Kubernetes resource - Secret
Administrator
ccm.kubernetes-service.create
Allow to create Kubernetes resource - Service
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-service.delete
Allow to delete Kubernetes resource - Service
Administrator
ccm.kubernetes-serviceaccount.create
Allow to create Kubernetes resource - ServiceAccount
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-serviceaccount.delete
Allow to delete Kubernetes resource - ServiceAccount
Administrator
ccm.kubernetes-statefulset.create
Allow to create Kubernetes resource - StatefulSet
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-statefulset.delete
Allow to delete Kubernetes resource - StatefulSet
Administrator
ccm.kubernetes-storageclass.create
Allow to create Kubernetes resource - StorageClass
  • Administrator
  • Editor
  • Operator
ccm.kubernetes-storageclass.delete
Allow to delete Kubernetes resource - StorageClass
Administrator
ccm.pod-logs.download
Allow to download pod logs
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.prometheus-alerts.view
Allow to view cluster alerts
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.prometheus-node-metrics.view
Allow to view cluster node-metrics
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.prometheus-pod-metrics.view
Allow to view cluster pod-metrics
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.prometheus-stats.view
Allow to view cluster stats
  • Administrator
  • Editor
  • Operator
  • Viewer
ccm.provider-aggregates.view
Allow to view cluster provider aggregates
  • Administrator
  • Editor
  • Operator
  • Viewer
Do you have two minutes for a quick survey?
Take Survey