Skip to main content

Frontier

Frontier is a cloud native role-based authorization aware server and reverse-proxy system. With Frontier, you can assign roles to users or groups of users to configure policies that determine whether a particular user has the ability to perform a certain action on a given resource. Guardian supports access management to the following resources in Frontier:

  1. Team
  2. Project
  3. Organization

Compatible version of Frontier :

<= v0.4.1

Authentication

Guardian requires authentication email of an administrator user having access to all Organizations in Frontier.

Example Credential config for Frontier provider:

---
credentials:
host: http://localhost:12345
auth_email: "guardian_test@test.com"

Example provider config for Frontier provider:

Config

sample.config.yaml
type: frontier
urn: frontier-provider-urn
credentials:
host: http://localhost:12345
auth_email: "guardian_test@test.com"
allowed_account_types:
- user
resources:
- type: team
policy:
id: policy_id
version: 1
roles:
- id: member
name: Member
permissions:
- users
- id: admin
name: Admin
permissions:
- admins
- type: project
policy:
id: policy_id
version: 1
roles:
- id: admin
name: Admin
permissions:
- admins
- type: organization
policy:
id: policy_id
version: 1
roles:
- id: admin
name: Admin
permissions:
- admins

Frontier Credentials

Fields
hoststring Required. Frontier instance host Example: http://localhost:12345
auth_emailemail Required. Email address of an account that has Organization Administration permission

Frontier Resource Type

  • team
  • project
  • organization

Frontier Resource Permission

TypeDetails
Required. stringFrontier permission mapping Possible values: -
team: users (Member of team), admins (admin of team)
project: admins (Admin of project)
organization:admins (Admin of Org)