1
+ # yaml-language-server: $schema=https://raw.githubusercontent.com/RedHatInsights/frontend-components/refs/heads/master/packages/config-utils/src/feo/spec/frontend-crd.schema.json
1
2
---
2
3
apiVersion : v1
3
4
kind : Template
@@ -19,43 +20,113 @@ objects:
19
20
paths :
20
21
- /apps/rbac
21
22
image : ${IMAGE}:${IMAGE_TAG}
22
- navItems :
23
- - appId : ' rbac'
24
- title : ' My User Access'
25
- href : ' /iam/my-user-access'
26
- description : ' View your account permissions for Red Hat Hybrid Cloud Console services.'
27
- - title : ' User Access'
28
- expandable : true
29
- permissions :
30
- - method : ' isEntitled'
31
- routes :
32
- - appId : ' rbac'
33
- title : ' Users'
34
- href : ' /iam/user-access/users'
35
- - appId : ' rbac'
36
- title : ' Roles'
37
- href : ' /iam/user-access/roles'
38
- - appId : ' rbac'
39
- title : ' Groups'
40
- href : ' /iam/user-access/groups'
41
- - appId : ' accessRequests'
42
- title : ' Red Hat Access Requests'
43
- href : ' //iam/user-access/access-requests'
44
- notifier : ' chrome.accessRequests.hasUnseen'
23
+ feoConfigEnabled : true
24
+ serviceTiles :
25
+ - section : iam
26
+ group : iam
27
+ id : users
28
+ href : /iam/user-access/users
29
+ title : Users
30
+ description : Manage your organization's role-based access control (RBAC) to services.
31
+ icon : PlaceholderIcon
32
+ - section : iam
33
+ group : iam
34
+ id : groups
35
+ href : /iam/user-access/groups
36
+ title : Groups
37
+ description : " "
38
+ icon : PlaceholderIcon
39
+ - section : iam
40
+ group : iam
41
+ id : authFactors
42
+ href : /iam/authentication-policy/authentication-factors
43
+ title : Authentication Factors
44
+ description : Manage how your organization authenticates to Red Hat services.
45
+ icon : authFactors
46
+ - section : iam
47
+ group : iam
48
+ id : serviceAccounts
49
+ href : /iam/service-accounts
50
+ title : Service Accounts
51
+ description : Authenticate and connect securely to APIs from multiple services.
52
+ icon : ServicesIcon
53
+ - section : iam
54
+ group : iam
55
+ id : idpIntegration
56
+ href : /iam/authentication-policy/identity-provider-integration
57
+ title : Identity Provider Integration
58
+ description : Manage identity provider integration for your organization.
59
+ icon : PlaceholderIcon
60
+ bundleSegments :
61
+ - segmentId : module-rbac-ui
62
+ bundleId : iam
63
+ navItems :
64
+ - id : my-user-access
65
+ title : My User Access
66
+ href : /iam/my-user-access
67
+ - id : user-access
68
+ title : User Access
69
+ expandable : true
70
+ permissions :
71
+ - method : loosePermissions
72
+ args :
73
+ - - 'rbac:*:*'
74
+ - method : featureFlag
75
+ args :
76
+ - platform.rbac.workspaces
77
+ - false
78
+ routes :
79
+ - id : overview
80
+ title : Overview
81
+ href : /iam/user-access/overview
82
+ permissions :
83
+ - method : featureFlag
84
+ args :
85
+ - platform.rbac.overview
86
+ - true
87
+ product : Identity & Access Management
88
+ - id : users
89
+ title : Users
90
+ href : /iam/user-access/users
91
+ icon : PlaceholderIcon
92
+ product : Identity & Access Management
93
+
94
+ - id : roles
95
+ title : Roles
96
+ href : /iam/user-access/roles
97
+ product : Identity & Access Management
98
+ - id : groups
99
+ title : Groups
100
+ href : /iam/user-access/groups
101
+ icon : PlaceholderIcon
102
+ product : Identity & Access Management
103
+ - id : accessRequests
104
+ title : Red Hat Access Requests
105
+ href : /iam/user-access/access-requests
106
+ notifier : chrome.accessRequests.hasUnseen
107
+ position : 100
45
108
module :
46
- ' manifestLocation ' : ' /apps/rbac/fed-mods.json'
47
- ' isFedramp ' : true
48
- ' defaultDocumentTitle ' : ' User Access | Identity & Access Management'
109
+ manifestLocation : /apps/rbac/fed-mods.json
110
+ defaultDocumentTitle : User Access | Identity & Access Management
111
+ config :
112
+ ssoScopes :
113
+ - api.console
114
+ - api.iam.service_accounts
49
115
modules :
50
- - id : ' my-user-access'
51
- module : ' ./MyUserAccess'
116
+ - id : my-user-access
117
+ module : ./MyUserAccess
52
118
routes :
53
119
- pathname : /iam
54
120
- pathname : /iam/my-user-access
55
- - id : ' iam-user-access'
56
- module : ' ./IamUserAccess'
121
+ - id : settings-user-access
122
+ module : ./SettingsUserAccess
123
+ routes :
124
+ - pathname : /settings/rbac
125
+ - id : iam-user-access
126
+ module : ./IamUserAccess
57
127
routes :
58
- - pathname : /iam/user-acces
128
+ - pathname : /iam/user-access
129
+ - pathname : /iam/access-management
59
130
60
131
parameters :
61
132
- name : ENV_NAME
0 commit comments