Add RS Gateway Users

Unless anonymous access is enabled, all RS Gateway clients must be defined in rsgateway_users.yaml.

About this task

The rsgateway_users.yaml file restricts access to RS Gateway. Users and roles defined in this file override the out-of-the-box users. By default, an admin user is defined in the rsgateway_users.yaml file. To enable more users, add the users as described here.

Procedure

  1. Configure the rsgateway_users.yaml file with a ConfigMap in the Helm values file.
    The configuration is:
    username: "{EncodingAlgorithm}EncodedPassword, role1, role2, roleN"
    where:
    • username — The client's login ID.
    • EncodingAlgorithm — The encoding algorithm (such as bcrypt).
    • EncodedPassword — An EncodingAlgorithm-encoded password string.
    • role(1, 2, N) — A comma-separated list of RS Gateway roles.
    For example:
    rsgateway:
      configuration:
        container:
          configmap:
            rsgateway_users.yaml: |-
              john: '{bcrypt}$2a$10$dXJ3SW6G7P50lGmMkkmwe.20cQQubK3.HZWzG3YB1tlRy.fqvM/BG, MTX_ROLE_RSG_CREATE, MTX_ROLE_RSG_READ, MTX_ROLE_RSG_UPDATE, MTX_ROLE_RSG_DELETE, MTX_ROLE_RSG_STD' 
  2. Apply the configuration and restart RS Gateway with a command like the following:
    helm upgrade ag1 matrixx/matrixx --namespace matrixx-webapps-gateways -f matrixx-webapps-gateways_values.yaml --version 5270

    Where matrixx-webapps-gateways_values.yaml is a Helm values file that defines the ConfigMaps and enables RS Gateway.

Results

The files are dynamically created and mounted to /sync/conf, which is synchronized with /opt/mtx/conf in the component container at start-up, using rsync. Restart RS Gateway to pick up the changes. The new user can now access RS Gateway and perform the actions permitted by the assigned roles.
Note: To delete a user, remove the user from the configuration and update the file on the pod.