.. rzl1582124533847 .. _configure-users-groups-and-authorization: ========================================== Configure Users, Groups, and Authorization ========================================== You can create a **user**, and optionally one or more **groups** that the **user** is a member of, in your Windows Active Directory server. .. rubric:: |context| The example below is for a **testuser** user who is a member of the, **billingDeptGroup**, and **managerGroup** groups. See `Microsoft documentation on Windows Active Directory <https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/get-started/vi rtual-dc/active-directory-domain-services-overview>`__ for additional information on adding users and groups to Windows Active Directory. Use the following procedure to configure the desired authorization on |prod-long| for the user or the user's group\(s\): .. rubric:: |proc| .. _configure-users-groups-and-authorization-steps-b2f-ck4-dlb: #. In |prod-long|, bind Kubernetes |RBAC| role\(s\) for the **testuser**. For example, give **testuser** admin privileges, by creating the following deployment file, and deploy the file with :command:`kubectl apply -f` <filename>. .. code-block:: none kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: testuser-rolebinding roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cluster-admin subjects: - apiGroup: rbac.authorization.k8s.io kind: User name: testuser Alternatively, you can bind Kubernetes |RBAC| role\(s\) for the group\(s\) of the **testuser**. For example, give all members of the **billingDeptGroup** admin privileges, by creating the following deployment file, and deploy the file with :command:`kubectl apply -f` <filename>. .. code-block:: none kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: testuser-rolebinding roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cluster-admin subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: billingDeptGroup