Skip to content

Kubernetes User Impersonation for Namespace-Level RBAC Enforcement #401

@vfarcic

Description

@vfarcic

PRD: Kubernetes User Impersonation for Namespace-Level RBAC Enforcement

Problem: dot-ai uses a single shared ServiceAccount for all kubectl operations. Even with tool-level RBAC (PRD #392), a user restricted to dotai-viewer can still query resources in namespaces they shouldn't access because kubectl runs with the SA's full cluster permissions.

Solution: Use Kubernetes user impersonation (--as/--as-group flags) so kubectl commands execute with the authenticated user's identity. Kubernetes itself enforces namespace-level access — no application-level filtering needed. Disabled by default, enabled via Helm chart value.

Detailed PRD: See prds/401-namespace-rbac-impersonation.md

Priority: High

Metadata

Metadata

Assignees

No one assigned

    Labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions