Documentation > User Interface > Access Control View
The Access Control Section in Orchetrix provides an overview of Kubernetes security resources, including Service Accounts, Cluster Roles, Role, Cluster Role Bindings, and Role Bindings. These resources help manage permissions and access to the cluster, ensuring that only authorized users or services can interact with critical workloads and configurations.
A Cluster Role defines a set of permissions (verbs on resources) that apply across the entire cluster. Cluster Roles can be bound to users, groups, or service accounts using Cluster Role Bindings or Role Bindings and are often used for granting access to non-namespaced resources.
Learn more about Cluster Roles in the official Kubernetes documentation
The Cluster Roles table lists all Cluster Roles in the cluster. Clicking on a role opens a details panel with tabs for Overview, Rules, YAML, and Events. Use the Search Resources field to locate roles by name.
You can sort, bulk delete, and refresh the table view. Use the More Actions menu to quickly access Edit and Delete functions.
Default Columns:
Name: Cluster Role name
Age: Created time
Options: View Rules, Edit, Delete
A Role is similar to a Cluster Role, but it is namespaced and only grants permissions within a specific namespace. Roles are typically used to grant fine-grained access to namespace-scoped resources such as Pods, ConfigMaps, or Secrets.
Learn more about Roles in the official Kubernetes documentation
The Roles table displays all namespaced Roles in the cluster. Selecting a role opens a details panel with Overview, Rules, YAML, and Events tabs. Use the Namespace drop-down and Search Resources to locate roles quickly.
You can sort columns, select multiple roles for bulk deletion, and use the Refresh button to reload the data. Actions like Edit and Delete are available from the More Actions menu.
Default Columns:
Name: Role name
Namespace: Namespace where the role applies
Age: Created time
Options: View Rules, Edit, Delete
A ClusterRoleBinding binds a ClusterRole to a user, group, or service account, granting the specified permissions cluster-wide. This is often used to assign admin or read-only access across the entire cluster.
Learn more about ClusterRoleBindings in the official Kubernetes documentation
The Cluster Role Bindings table lists all bindings in the cluster. Clicking a binding opens a details panel with Overview, Subjects, YAML, and Events. Use the Search Resources input to locate specific bindings.
Columns are sortable, and you can use the Delete Selected button for batch removal. Click Refresh to update the table. Additional options are available under the More Actions menu.
Default Columns:
Name: Binding name
Bindings:
Age: Created time
Options: View, Edit, Delete
A Role Binding grants a Role or Cluster Role to a user, group, or service account within a specific namespace. This is commonly used for scoped access control in multi-tenant or restricted environments.
Learn more about RoleBindings in the official Kubernetes documentation
The Role Bindings table displays all role bindings across namespaces. Selecting an item opens a details panel with tabs for Overview, Subjects, YAML, and Events. Filter with the Namespace drop-down or use Search Resources to locate bindings.
Supports sorting, multi-select delete, and Refresh actions. Use the More Actions menu for Edit and Delete functions.
Default Columns:
Name: Binding name
Namespace: Namespace of scope
Bindings:
Age: Created time
Options: View, Edit, Delete
In Kubernetes, a Service Account provides an identity for processes running in a Pod. This identity is used when the Pod interacts with the Kubernetes API. Service Accounts are commonly associated with RBAC roles to define what the workload is allowed to access or perform inside the cluster.
Learn more about Service Accounts in the official Kubernetes documentation
The Service Accounts table lists all service accounts across namespaces. Selecting a service account opens a details panel with Overview, Secrets, YAML, and Events tabs. Use the Namespace drop-down or Search Resources field to filter or locate specific service accounts.
You can sort columns, select multiple service accounts with checkboxes, and use the Delete Selected button for bulk deletion. The Refresh button updates the view. Additional actions like Edit and Delete are available through the More Actions menu.
Default Columns:
Name: Service Account name
Namespace: Namespace where it's defined
Age: Created time
Options: View, Edit, Delete