Add a Default Role to Privacera Portal Users¶
You can configure default role mapping in the Privacera Portal to assign specific roles to users logging in through SSO Identity Providers (IdP) such as LDAP/AD or SAML.
By setting a default role, you ensure that users authenticating via the Identity Provider (IdP) are automatically assigned the specified role(s) upon their first login. This streamlines user management and ensures consistent access control policies.
To configure a default role for IdP users, follow these steps:
-
SSH into the instance where Privacera Manager is installed.
-
Navigate to the configuration directory:
Bash -
Copy the sample variables to the custom variables directory if they are not already present:
Bash -
Open the
vars.portal.yml
file for editing:Bash -
Locate the variable for setting the default user role and uncomment it. Assign the desired role(s) as a comma-separated list:
YAML Example
YAML -
Save and close the file.
Deploying the Service¶
-
Generate the Helm charts. This step prepares the required Kubernetes configurations for deploying the Privacera services.
-
Apply the Helm charts. This will deploy the Privacera services to your Kubernetes cluster and may take a few minutes.
Bash -
Perform post-installation steps, such as generating the plugin tarball and updating Route 53 DNS. These steps are essential to finalize the deployment and ensure that all services are properly configured.
Bash
By following these steps, you will have successfully configured a default role for users authenticating through your IdP.