Skip to content

Commit b125a9a

Browse files
committed
links
1 parent 8591385 commit b125a9a

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

docs/admin/runai-setup/authentication/authentication-overview.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,39 +7,39 @@ Authentication verifies user identity during login, and Authorization assigns th
77

88
Authenticated access is required to use all aspects of the Run:ai interfaces, including the Run:ai platform, the Run:ai Command Line Interface (CLI) and APIs.
99

10-
## **Authentication**
10+
## Authentication
1111

1212
There are multiple methods to authenticate and access Run:ai.
1313

14-
### **Single Sign-On (SSO)**
14+
### Single Sign-On (SSO)
1515

1616
Single Sign-On (SSO) is the preferred authentication method by large organizations, as it avoids the need to manage duplicate sets of user identities.
1717

1818
Run:ai offers SSO integration, enabling users to utilize existing organizational credentials to access Run:ai without requiring dedicated credentials.
1919

20-
Run:ai supports three methods to setup SSO:
20+
Run:ai supports three methods to set up SSO:
2121

22-
* SAML
23-
* OpenID Connect (OIDC)
24-
* OpenShift
22+
* [SAML](sso/saml.md)
23+
* [OpenID Connect (OIDC)](sso/openidconnect.md)
24+
* [OpenShift](sso/openshift.md)
2525

2626
When using SSO, it is highly recommended to manage at least one local user, as a breakglass account (an emergency account), in case access to SSO is not possible.
2727

28-
### **Username and password**
28+
### Username and password
2929

3030
Username and password access can be used when SSO integration is not possible.
3131

32-
### **Secret key (for Application programmatic access)**
32+
### Secret key (for Application programmatic access)
3333

3434
Secret is the authentication method for Applications. Applications use the Run:ai APIs to perform automated tasks including scripts and pipelines based on its assigned access rules.
3535

36-
## **Authorization**
36+
## Authorization
3737

3838
The Run:ai platform uses Role Base Access Control (RBAC) to manage authorization.
3939

4040
Once a user or an application is authenticated, they can perform actions according to their assigned access rules.
4141

42-
### **Role Based Access Control (RBAC) in Run:ai**
42+
### Role Based Access Control (RBAC) in Run:ai
4343

4444
While Kubernetes RBAC is limited to a single cluster, Run:ai expands the scope of Kubernetes RBAC, making it easy for administrators to manage access rules across multiple clusters.
4545

0 commit comments

Comments
 (0)