arrow-left

All pages
gitbookPowered by GitBook
1 of 10

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Container Shell

Access to the container shell in the DuploCloud Portal

Users can access the container's shell. No keys are required; you can access it securely with one- click. The platform manages access for Kubernetes, ECS, or Docker Native-based deployments.

Access the container by selecting the Host/VM and clicking the Containers tab. Then, click the options menu next to the selected container ( ) and select Container Shell.

Database Access for Users

Grant access to specific databases for DuploCloud users

Administrators have full access to all databases created in all DuploCloud Tenants. A non-administrator user can view and use database engine types created by an administrator if the administrator grants them view rights.

hashtag
Granting Users View Access to Database Engines

  1. In the DuploCloud Portal, navigate to Administrator -> System Settings.

  2. Click System Config.

  3. Click Add. The Add Config pane displays.

  4. From the Config Type list box, select AppConfig.

  5. From the Key list box, select RDS approved list for non admin users.

  6. Select the Value list box, and select the types of databases you want non-administrator users to access. In this example, the user is granted access to any Aurora-MySql and Aurora-PostgreSql database engines the Administrator creates.

  7. Click Submit. The AppConfig configuration setting is displayed on the System Settings page.

Authentication Methods

Authentication methods supported by the DuploCloud Platform

You can SSO to the DuploCloud platform via Google, Microsoft, or Okta. We do not manage usernames and passwords within DuploCloud. A user's identity on the platform is their email address.

The Tenant is the basis of all access management. Users only need to be granted access to the Tenant, and from there, when they login to the DuploCloud platform, they are given access to the individual resources within that tenant on a need-basis, as described in the next section.

Beyond Tenant-level access, there are three additional user types:

  • ReadOnly

Administrator

  • Security Auditor, who only views the monitoring aspects of security.

  • Users can also create groups in Microsoft AD or Okta that can be mapped to Tenants in DuploCloud. All administration can be performed from AD or Okta.

    Add Config pane
    System Settings page with AppConfig configuration setting

    Access Management

    Just-In-Time access to cloud resources in the DuploCloud Portal

    Access management pertains to giving users limited, need-based, and just-in-time access to the underlying cloud resources like access to cloud provider console/tokens, Virtual Machine shell, kubectl, etc.

    Kubernetes Access

    Access Kubernetes constructs directly in the DuploCloud platform

    The DuploCloud Platform enables access to every Tenant's namespace to which the user has access. You can temporarily access config maps via SSO authentication tokubeconfig. Permissions are scoped to the Kubernetes namespace.

    For administrators, Kubernetes access via SSO is available from the Administrator -> Infrastructure -> K8S. See these detailed instructions.

    Cloud Console, API and CLI

    Types of access managed by the DuploCloud Platform

    DuploCloud manages users' access to the cloud provider. This is achieved by creating a session in the cloud provider whose permissions are the same as the Tenant's IAM role.

    • In the case of AWS, such sessions are transient and do not require a username to be created in the cloud provider. When logged into the AWS console, the username appears as <tenant_name>/<email_address>. Note that this user has the same access as the Tenant in the IAM role. The same principle is used for CLI access. See the JIT section for more details.

    • In the case of GCP, the session is generated and has the same permissions as the Tenant's IAM role. The username itself does exist in GCP because it is a GSuite user, but the permissions that are generated and associated are Just-In-Time for the duration of the session.

    • In the case of Azure, each user is added to the user access list for the resource group that the Tenant is part of. The validity of this session is tied to the validity of the user login. The session's access is not transient and is permanently attached to the resource group for as long as the user has access to the tenant.

    All user activity in the direct cloud provider is tracked in the cloud provider audit trail like cloud trail.

    Tenant Security Rules for VPN Access

    Grant tenant-specific access to resources over a VPN

    For DuploCloud users to access internal resources in a Tenant, such as Hosts or databases, you must add security rules to allow a VPN connection. For details on VPN user access, see .

    circle-info

    Note: Administrators have persistent access to all Tenants and do not need to add individual Tenant access for themselves.

    hashtag
    Adding Tenant Security Rules for a VPN

    To define tenant security rules for VPN access:

    1. In the DuploCloud Portal, navigate to Administrators -> Tenants.

    2. Select the Tenant in the NAME column.

    3. Click the Security tab.

    4. Click Add. The Add Tenant Security pane displays.

    5. Complete the fields to configure the security rule.

      • In the example shown, the rule allows traffic originating from the VPN IP address to access resources that are private or internal to the tenant.

    6. Click Add to save the rule.

    circle-info

    If you want to grant some VPN users access while excluding others, add a separate security rule for each user using their individual IP address.

    VPN Access for Users

    Permission Sets

    Configure Permission Sets in DuploCloud for granular access control

    Permission Sets in DuploCloud provide fine-grained access control for users. They define which APIs/resource types a user can access within specific Tenants. Permission Sets can be assigned directly to users or bundled into Permission Groups for easier management.

    A Permission Set is a collection of allow or deny policies applied to users. These policies define which APIs, resource types, and HTTP methods a user can access within specific Tenants. Permission Sets are evaluated by priority, with lower numbers overriding higher numbers. Permission Sets can be system-wide, assigned directly to users, or assigned to user groups.

    A Permission Group is a bundle of users assigned one or more Permission Sets. Groups simplify administration by giving multiple users the same access rules and are ideal for managing permissions by team or role. Users inherit all permissions from the Permission Sets assigned to the group. Users can belong to multiple groups, and all permissions from their assigned groups are combined.

    Add Tenant Security pane
    hashtag
    Configuring Permission Sets in DuploCloud
    1. In the DuploCloud Portal, navigate to Administrator → Permissions.

    2. Select the Sets tab.

    3. Click Add. The Add Permission Set pane displays.

      Add Permission Set pane
    4. Complete the following fields:

    Name

    Enter a meaningful name for the Permission Set (e.g., deny-k8s-job).

    Scope

    Select the appropriate scope for the Permission Set (e.g., User or System Wide). Note: Choosing System Wide creates a Permission Set that applies to all users. This can be used for default allow-all permissions or to enforce explicit deny rules across the platform.

    Priority

    Enter a numeric value; lower numbers take higher precedence. (Tip: start with higher numbers like 50 for flexibility.)

    Applicable Tenants

    Select the applicable Tenants or choose All Tenants.

    Allow or Deny Policy

    Click Add Allow Policy or Add Deny Policy and complete the following fields:

    • Resource Type RegEx: Enter the resource type (e.g., k8s/job).

    • API Name RegEx: Enter a regex matching the API (e.g., .*k8s/job.*).

    1. Click Save to create the Permission Set.

    hashtag
    Assigning Users to a Permission Set

    After creating a Permission Set, assign specific users to it:

    1. In the DuploCloud Portal, navigate to Administrator → Permissions.

    2. Select the Sets tab.

    3. Select the Permission Set from the NAME column. The Permission Set details page displays.

      Adding users to the permission set
    4. Select the Users tab.

    5. Select the users to whom the Permission Set should apply.

    6. Click Save.

    hashtag
    Creating a User Group

    User Groups allow you to assign multiple users the same set of permissions at once.

    1. Navigate to Administrator → Permissions.

    2. Select the Groups tab.

    3. Click Add. The Add Permission Group pane displays.

      Add Permission Group pane
    4. Complete the fields:

    Name

    Enter a descriptive name for the Permission Group.

    Users

    Select one or more users to include in the group.

    Permissions

    Click Add under Permissions. The Add Permissions pane displays:

    • Select one or more Permission Sets to assign to the group.

    • Click Add to confirm the selection.

    1. Click Add to create the Permission Group.

    circle-info

    hashtag
    Notes on User Groups

    • Users inherit all permissions from the assigned Permission Sets.

    • Users can belong to multiple groups; all permissions are combined.

    hashtag
    Handling Conflicting Permissions

    It is possible for a user to be assigned multiple Permission Sets that contain contradictory rules. DuploCloud resolves conflicts using the following logic:

    • Priority Evaluation: Permission Sets are evaluated in ascending priority (lower numbers first).

    • First Match Wins: The first matching policy (allow or deny) determines access.

    • Default Deny: If no policy matches, access is denied by default (400 error).

    Example:

    • Permission Set A (priority 5) denies GetSecretData

    • Permission Set B (priority 10) allows GetSecretData

    • Result: access is denied because Permission Set A has higher precedence.

    Best Practices:

    • Assign careful priority numbers to Permission Sets to ensure intended behavior.

    • Use Permission Groups to simplify management, but check for overlapping sets with conflicting rules.

    hashtag
    Testing Permission Set or User Group Configuration

    1. Log in as a user assigned to a Permission Set or a User Group.

    2. Attempt actions governed by the assigned Permission Set(s).

    3. Verify that access is granted or denied according to the rules.

    Cross-Tenant Resource Sharing

    Allow multiple Tenants access to the same resources

    Cross-tenant access enables you to share access to resources and services between two DuploCloud . You can configure the DuploCloud Portal to support various types of Cross-tenant access.

    Configure Cross-tenant access to:

    • .

    Method: Choose GET, POST, PUT, DELETE, or ALL.

    Share specific services between Tenants in the DuploCloud Portal that IAM policies restrict.
    circle-info

    These features are currently only available for AWS.

    hashtag
    Prerequisites

    Before you can use Cross-tenant access, you must do the following:

    • In the Security Group associated with each tenant, add a Security Group rule to allow the required port access between the tenants that need cross-tenant access.

    • When accessing a resource in a tenant, include the full application namespace in the URL using this format:

    hashtag
    Granting General (Non-IAM Restricted) Access Between Tenants

    When you grant general (non-IAM restricted) access between tenants, you allow one DuploCloud tenant full access to another tenant’s workspace or namespace. Security Groups in your underlying cloud platform define any restrictions.

    To grant Cross-tenant access only to specific services restricted by IAM policies, see the next section.

    1. In the DuploCloud Portal, navigate to Administrator -> Tenants.

    2. Select the Tenant whose resources you want to share from the NAME column.

    3. Click the Security tab.

    4. Click Add. The Add Tenant Security pane displays.

    5. From the Source Type list box, select Tenant.

    6. From the Tenants list box, select the Tenant that will share resources.

    7. From the Protocol list box, select the protocol to use for sharing.

    8. In the Port Range field, specify the range of ports to which you want to grant access.

    9. Add a user-friendly Description of this sharing rule.

    10. Click Add.

    hashtag
    Granting Cross-Tenant Access to Specific IAM-Restricted Services

    To allow access or create a share between Tenants for specific IAM-restricted services, perform this procedure using the Tenant Grants tab. Tenants sharing resources must reside within the same region in the AWS Portal.

    To establish general non-IAM restricted Cross-tenant access, see the previous section.

    You can share access to the following Services between Tenants:

    • S3 Buckets

    • DynamoDB Tables

    • KMS Keys

    To configure cross-tenant access:

    1. In the DuploCloud portal, navigate to Administrator -> Tenants.

    2. From the NAME column, select the tenant that currently has access to the restricted resource you want to share.

    3. Click the Grants tab. Select Allow Other Tenants to access TENANT_NAME, where TENANT_NAME is the Tenant you selected.

    4. Click Add. The Grant Cross-Tenant Access pane displays.

    5. From the Requesting Tenant list box, select the Tenant with which access will be shared.

    6. From the Access to Area list box, select the restricted policy-based resource you want to share.

    7. Click Create. Your cross-tenant access share is now created.

    hashtag
    Viewing Cross-Tenant Grants to Restricted Policy-Based Resources

    1. In the DuploCloud portal, navigate to Administrator -> Tenants.

    2. From the NAME column, select the tenant whose cross-tenant grants you want to view.

    3. Click the Grants tab. Select Allow Other Tenants to access TENANT_NAME, where TENANT_NAME is the Tenant you selected.

    4. The resources that TENANT_NAME can access are displayed.

    Grants tab on the Tenant page
    Tenants
    Grant a Tenant full access to another Tenant in the DuploCloud Portal

    VM SSH

    SSH access to Hosts in the DuploCloud Platform

    Just-in-time access to the VM shell is supported for AWS and GCP. Behind the scenes, the platform orchestrates AWS SSM and GCP console access features to achieve this. Users connect to the shell by navigating to Cloud Services -> Hosts -> VM_Name -> Actions -> Connect SSH, as shown below. In the case of Azure, use the Azure console to access the VM, and using the left navigational menu, choose the Connect -> Azure Portal option.

    https://NAMESPACE.duploservices-TENANT_NAME:PORT
    Add Tenant Security pane
    Grants tab with Allow Other Tenants to access TENANT_NAME option
    Grant Cross-Tenant Access pane
    The Connect SSH option in the DuploCloud Portal