Keychains
Keychains are a collection of keys
Layer5 Cloud provides a multi-tenant security model designed to manage access across complex organizational structures. This section covers the core components of our Identity and Access Management (IAM) system.
The following diagram illustrates the relationship between Organizational Units, Roles, and the underlying Permissions:
Layer5 Cloud uses a hierarchical structure to isolate resources and manage users at scale:
Access is granted through Role-Based Access Control (RBAC). Roles are assigned at different levels of the organizational hierarchy:
Beyond structural roles, Layer5 Cloud uses cryptographic and session-based security:
Keychains are collections of keys used to manage environment-specific access and signing. They allow for the logical grouping of related security credentials.
Keys are the atomic unit of access control within the system. They are used for secure communication between Meshery and Layer5 Cloud, as well as for signing design patterns.
Tokens provide temporary, secure access to the platform.
Check out the Roles Reference for a complete matrix of permissions for each role.
Keychains are a collection of keys
Keys are the atomic unit of access control
Roles map permissions to users. Roles contain any number of keychains, which contain any number of keys (permissions). Assign roles to users to grant permissions.
User sessions are created each time a user successfully authenticates.
API Tokens are used to authenticate to Layer5 Cloud’s REST API. Generated on your user account’s security tokens page. Tokens can be revoked at any time.