Finer-grained RBAC for WAAP: Service-Policy-only permissions per namespace

We request the ability to grant CRUD and/or read-only permissions specifically for Service Policy objects within a given namespace (default, in our case) without implicitly granting access to other WAAP objects. Today, custom roles are add-on service centric; the closest option is to use f5xc-waap-* API Groups (e.g., f5xc-waap-standard-user), which results in broader access than required for strict least-privilege.

Why it matters:

  • Security & compliance: enforce least-privilege for teams who must manage only Service Policy.

  • Operational separation: delegate Service Policy lifecycle (create/update/delete) to a focused group without expanding access to unrelated WAAP resources.

  • Auditing: clearer mapping of responsibilities and reduced risk surface.

Requested scope:

  • RBAC primitives that allow targeting specific WAAP resource types (e.g., Service Policy) with verbs { get, list, watch, create, update, patch, delete } per namespace.

  • Ideally exposed via namespace_role with one or more API Groups (or equivalent granularity) dedicated to Service Policy.

Workarounds today:

  • Use f5xc-waap-* API Groups that include Service Policy, accepting broader permissions than needed.

Impact:

  • Enables tighter controls for regulated environments and larger teams.

  • Guest
  • Sep 4 2025
  • Attach files