You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/concepts/guardrails/cmdb.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,8 +10,9 @@ sidebar_label: CMDB
10
10
The CMDB control is responsible for populating and updating all the attributes
11
11
for that resource type in the Guardrails CMDB.
12
12
13
-
<divclassName="example"> The Resource Type <code>AWS > SQS > Queue</code> defines a
14
-
Control <code>AWS > SQS > Queue > CMDB</code> with a target Resource Type of <code>AWS > SQS > Queue</code>.
13
+
<divclassName="example">
14
+
The Resource Type <code>AWS > SQS > Queue</code> defines a
15
+
Control <code>AWS > SQS > Queue > CMDB</code> with a target Resource Type of <code>AWS > SQS > Queue</code>.
15
16
</div>
16
17
17
18
### Policies to control CMDB
@@ -20,13 +21,15 @@ CMDB controls have an associated policy that allows them to be enforced or
20
21
skipped. Note, however, that if CMDB is set to `Skip` for a resource, then it
21
22
will not exist in the CMDB, and _no controls that target it will run_.
22
23
23
-
<divclassName="example"> The <code>AWS > S3 > Bucket > CMDB</code> policy may be set to `Skip` or `Enforce: Enabled`
24
+
<divclassName="example">
25
+
The <code>AWS > S3 > Bucket > CMDB</code> policy may be set to `Skip` or `Enforce: Enabled`
24
26
</div>
25
27
26
28
CMDB controls also use the `Region` policy associated with the resource. If
27
29
region is not in `Regions` policy, the CMDB control should delete the resource
28
30
from the CMDB (since we don’t want to capture any resources in that region, we
29
31
should also cleanup).
30
32
31
-
<divclassName="example"> The <code>AWS > S3 > Bucket > CMDB</code> will add/modify a resource in the CMDB if the resource is in region specified in <code>AWS > S3 > Bucket > Regions</code>, and delete it from the CMDB if it is not.
33
+
<divclassName="example">
34
+
The <code>AWS > S3 > Bucket > CMDB</code> will add/modify a resource in the CMDB if the resource is in region specified in <code>AWS > S3 > Bucket > Regions</code>, and delete it from the CMDB if it is not.
Copy file name to clipboardExpand all lines: docs/concepts/guardrails/discovery.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,21 +19,24 @@ the Guardrails CMDB.
19
19
Once discovered, the resource is then responsible for tracking changes to itself
20
20
through the CMDB control.
21
21
22
-
<divclassName="example"> The Resource Type <code>AWS > SQS > Queue</code> defines a
22
+
<divclassName="example">
23
+
The Resource Type <code>AWS > SQS > Queue</code> defines a
23
24
Control <code>AWS > SQS > Queue > Discovery</code> with a target Resource Type of <code>AWS > Region</code>.
24
25
</div>
25
26
26
27
### Policies to control Discovery
27
28
28
29
Discovery controls are enforced or skipped based on the associated CMDB policy.
29
30
30
-
<divclassName="example"> The <code>AWS > S3 > Bucket > Discovery</code> control relies on the value of the <code>AWS > S3 > Bucket > CMDB</code> policy for its configuration. <code>AWS > S3 > Bucket > CMDB</code> may be set to `Skip` or `Enforce: Enabled`
31
+
<divclassName="example">
32
+
The <code>AWS > S3 > Bucket > Discovery</code> control relies on the value of the <code>AWS > S3 > Bucket > CMDB</code> policy for its configuration. <code>AWS > S3 > Bucket > CMDB</code> may be set to `Skip` or `Enforce: Enabled`
31
33
</div>
32
34
33
35
Discovery controls also use the `Region` policy associated with the resource. If
34
36
region is not in `Regions` policy, the CMDB control should delete the resource
35
37
from the CMDB (since we don’t want to capture any resources in that region, we
36
38
should also cleanup).
37
39
38
-
<divclassName="example"> The <code>AWS > S3 > Bucket > Discovery</code> control will search for S3 buckets in a the regions specified in <code>AWS > S3 > Bucket > Regions</code>, and will add any buckets it finds to the CMDB as <code>AWS > S3 > Bucket</code> resources.
40
+
<divclassName="example">
41
+
The <code>AWS > S3 > Bucket > Discovery</code> control will search for S3 buckets in a the regions specified in <code>AWS > S3 > Bucket > Regions</code>, and will add any buckets it finds to the CMDB as <code>AWS > S3 > Bucket</code> resources.
| Guardrails Local Directory | Guardrails provides support for basic user and group management in an internal directory. Guardrails local directories are typically used for bootstrapping and break-glass access. An installation of Guardrails will contain an initial internal directory, with a break-glass/admin user. This user can then be used to create further break-glass users, or add and manage additional directories. |
| Guardrails Local Directory | Guardrails provides support for basic user and group management in an internal directory. Guardrails local directories are typically used for bootstrapping and break-glass access. An installation of Guardrails will contain an initial internal directory, with a break-glass/admin user. This user can then be used to create further break-glass users, or add and manage additional directories. |
23
23
| Turbot.com Directory | While named similarly, the Turbot.com directory is the connection of the user profile that exists on turbot.com and workspaces. A Turbot.com directory can be created in a workspace, and when attempting to log in via this directory, the user will get redirected to guardrails.turbot.com and back to the workspace! A profile is created upon the first login and administrators can assign permissions once the user has done so. |
24
-
| Google | Guardrails integrates with Google domains via a client ID/secret pair, allowing users within that domain to log into Guardrails. Group management can be done from within the Google Admin console. |
25
-
| SAML | We have integrations with Identity Providers (IDPs) such as Okta, Ping, ADFS and in-house SAML solutions.<br/><br/>SAML is a popular choice, particularly with customers wishing to access Cloud Providers such as AWS, but without needing to provide direct access back to their on-site directory (e.g. Active Directory).<br/><br/>Guardrails also supports the sourcing of user groups in the SAML assertion |
26
-
| LDAP/ LDAPS | Guardrails can use a LDAP/ LDAPS directory to sync groups and users and map them to existing profiles. |
24
+
| Google | Guardrails integrates with Google domains via a client ID/secret pair, allowing users within that domain to log into Guardrails. Group management can be done from within the Google Admin console. |
25
+
| SAML | We have integrations with Identity Providers (IDPs) such as Okta, Ping, ADFS and in-house SAML solutions.<br/><br/>SAML is a popular choice, particularly with customers wishing to access Cloud Providers such as AWS, but without needing to provide direct access back to their on-site directory (e.g. Active Directory).<br/><br/>Guardrails also supports the sourcing of user groups in the SAML assertion |
26
+
| LDAP/ LDAPS | Guardrails can use a LDAP/ LDAPS directory to sync groups and users and map them to existing profiles. |
27
27
28
28
To setup a new directory or if there are questions regarding LDAP group sync,
29
29
head on over to our [Directories guide](guides/configuring-guardrails/directories).
@@ -54,7 +54,8 @@ Guardrails, that same user may require a different identity in all of the provid
54
54
that Guardrails will interact with ( AWS, Azure, GCP, etc.). These mappings can be
55
55
controlled using policies that target the profile.
56
56
57
-
<divclassName="example"> Login name mappings for the Guardrails Profile
57
+
<divclassName="example">
58
+
Login name mappings for the Guardrails Profile
58
59
<code>Turbot > Google @ acme.com > John Doe</code> to login to AWS, Azure, and GCP
59
60
are set via the policies <code>Azure > IAM > Login Names</code>,
60
61
<code> GCP > IAM > Login Names</code>, and <code>AWS > IAM > Login User Names</code>
0 commit comments