Users and Groups
Rancher relies on users and groups to determine who is allowed to log in to Rancher and which resources they can access. When you configure an external authentication provider, users from that provider will be able to log in to your Rancher server. When a user logs in, the authentication provider will supply your Rancher server with a list of groups to which the user belongs.
Access to clusters, projects, and global DNS providers and entries can be controlled by adding either individual users or groups to these resources. When you add a group to a resource, all users who are members of that group in the authentication provider, will be able to access the resource with the permissions that you’ve specified for the group. For more information on roles and permissions, see Role Based Access Control.
Managing Members
When adding a user or group to a resource, you can search for users or groups by beginning to type their name. The Rancher server will query the authentication provider to find users and groups that match what you’ve entered. Searching is limited to the authentication provider that you are currently logged in with. For example, if you’ve enabled GitHub authentication but are logged in using a local user account, you will not be able to search for GitHub users or groups.
All users, whether they are local users or from an authentication provider, can be viewed and managed. In the upper left corner, click ☰ > Users & Authentication. In the left navigation bar, click Users.
SAML Provider Caveats:
|
User Information
Rancher maintains information about each user that logs in through an authentication provider. This information includes whether the user is allowed to access your Rancher server and the list of groups that the user belongs to. Rancher keeps this user information so that the CLI, API, and kubectl can accurately reflect the access that the user has based on their group membership in the authentication provider.
Whenever a user logs in to the UI using an authentication provider, Rancher automatically updates this user information.
Automatically Refreshing User Information
Rancher will periodically refresh the user information even before a user logs in through the UI. You can control how often Rancher performs this refresh.
Two settings control this behavior:
-
auth-user-info-max-age-seconds
This setting controls how old a user’s information can be before Rancher refreshes it. If a user makes an API call (either directly or by using the Rancher CLI or kubectl) and the time since the user’s last refresh is greater than this setting, then Rancher will trigger a refresh. This setting defaults to
3600
seconds, i.e. 1 hour. -
auth-user-info-resync-cron
This setting controls a recurring schedule for resyncing authentication provider information for all users. Regardless of whether a user has logged in or used the API recently, this will cause the user to be refreshed at the specified interval. This setting defaults to
0 0 * * *
, i.e. once a day at midnight. See the Cron documentation for more information on valid values for this setting.
To change these settings,
-
In the upper left corner, click ☰ > Global Settings.
-
Go to the setting you want to configure and click ⋮ > Edit Setting.
Since SAML does not support user lookup, SAML-based authentication providers do not support periodically refreshing user information. User information will only be refreshed when the user logs into the Rancher UI. |
Manually Refreshing User Information
If you are not sure the last time Rancher performed an automatic refresh of user information, you can perform a manual refresh of all users.
-
In the upper left corner, click ☰ > Users & Authentication.
-
On the Users page, click on Refresh Group Memberships.
Results: Rancher refreshes the user information for all users. Requesting this refresh will update which users can access Rancher as well as all the groups that each user belongs to.
Since SAML does not support user lookup, SAML-based authentication providers do not support the ability to manually refresh user information. User information will only be refreshed when the user logs into the Rancher UI. |
Minimum Password Length
By default, user passwords must be at least 12 characters long. However, you can customize the password length requirement:
-
In the upper left corner, click ☰ > Global Settings.
-
Go to
password-min-length
and click ⋮ > Edit Setting. -
Enter an integer value between 2 and 256, and click Save.
Session Length
The default length (TTL) of each user session is adjustable. The default session length is 16 hours.
-
In the upper left corner, click ☰ > Global Settings.
-
Go to
auth-user-session-ttl-minutes
and click ⋮ > Edit Setting. -
Enter the amount of time in minutes a session length should last and click Save.
Result: Users are automatically logged out of Rancher after the set number of minutes.