{{tag>rundeck acl}} ====== Rundeck add new role ACL policy ====== Log in to rundeck and go to //Settings > Access control > Create ACL policy// and paste the ACL configuration. Here is an example for "editor" role user having access to Backend project and being able to run "Sync" job: description: Editor context: project: 'Backend' for: resource: - equals: kind: event allow: 'read' - equals: kind: node allow: 'read' adhoc: - deny: run job: - equals: name: 'Sync' allow: [read,run,kill,killAs] node: - allow: [read,run,kill,killAs] by: group: editor --- description: Allow editors to actually see the above jobs context: application: 'rundeck' for: project: - match: name: 'Backend' allow: 'read' storage: # allow access to ssh key - match: path: 'keys/ssh_privkey' allow: 'read' by: group: editor Now create new user that belongs to the editor group in rundeck's //realm.properties// file, e.g. newuser:password1234,editor ===== Allow access to all jobs under Backend project ===== In job section above, don't match on name, so that part would go like ... job: - allow: [read,run,kill,killAs] ... ====== Tested on ====== * Rundeck (docker container) 4.5.0, 4.16.0 ====== See also ====== * ====== References ====== * https://resources.rundeck.com/learning/acl-policy-files-by-example/ * https://docs.rundeck.com/docs/administration/security/authorization.html#rundeck-resource-authorizations * https://kcaps.medium.com/rundeck-key-storage-acl-grant-access-to-path-27da34345220