Frontier
Frontier is a cloud native role-based authorization aware server and reverse-proxy system. With Frontier, you can assign roles to users or groups of users to configure policies that determine whether a particular user has the ability to perform a certain action on a given resource. Guardian supports access management to the following resources in Frontier:
- Team
- Project
- Organization
Compatible version of Frontier :
<= v0.4.1
Authentication
Guardian requires authentication email of an administrator user having access to all Organizations in Frontier.
Example Credential config for Frontier provider:
---
credentials:
host: http://localhost:12345
auth_email: "guardian_test@test.com"
Example provider config for Frontier provider:
Config
sample.config.yaml
type: frontier
urn: frontier-provider-urn
credentials:
host: http://localhost:12345
auth_email: "guardian_test@test.com"
allowed_account_types:
- user
resources:
- type: team
policy:
id: policy_id
version: 1
roles:
- id: member
name: Member
permissions:
- users
- id: admin
name: Admin
permissions:
- admins
- type: project
policy:
id: policy_id
version: 1
roles:
- id: admin
name: Admin
permissions:
- admins
- type: organization
policy:
id: policy_id
version: 1
roles:
- id: admin
name: Admin
permissions:
- admins
Frontier Credentials
Fields | |
---|---|
host | string Required. Frontier instance host Example: http://localhost:12345 |
auth_email | email Required. Email address of an account that has Organization Administration permission |
Frontier Resource Type
team
project
organization
Frontier Resource Permission
Type | Details | |
---|---|---|
Required. string | Frontier permission mapping Possible values: - team : users (Member of team), admins (admin of team) project : admins (Admin of project)organization :admins (Admin of Org) |