Skip to main content
Calico Cloud Pro documentation

Set up users

Authentication

Calico Cloud supports Google Social login and username / password for user authentication.

Roles and authorization

Users can have one or more of the following predefined user roles to access features in the web console. The default permissions align with typical needs for each role.

Owner

The Owner role has the highest level of access and typically corresponds to the account creator.

note

The Owner role cannot be assigned to new users. The only Owner is the user who created the Calico Cloud account.

FeaturePermission Level
Service Graph and Flow Visualizerview
Policiesview, edit
Nodes and Endpointsview
Network Setsview, edit
Managed Clustersview, edit, delete
Compliance Reportsview
Timelineview
Alertsview, edit
Kibanaview, edit
Image Assuranceview, edit
Manage Teamview, edit
Usage Metricsview
Threat Feedsview, edit
Web Application Firewallview, edit
Container Threat Detectionview, edit
Dashboardsview, edit

Admin

The Admin role provides broad administrative access for day-to-day configuration and management of Calico Cloud.

FeaturePermission Level
Service Graph and Flow Visualizerview
Policiesview, edit
Nodes and Endpointsview
Network Setsview, edit
Managed Clustersview, edit, delete
Compliance Reportsview
Timelineview
Alertsview, edit
Kibanaview, edit
Image Assuranceview, edit
Manage Teamview, edit
Usage Metrics-
Threat Feedsview, edit
Web Application Firewallview, edit
Container Threat Detectionview, edit
Dashboardsview, edit

User Admin

The User Admin role has the ability to manage team members and their assigned roles.

FeaturePermission Level
Service Graph and Flow Visualizer-
Policies-
Nodes and Endpoints-
Network Sets-
Managed Clusters-
Compliance Reports-
Timeline-
Alerts-
Kibana-
Image Assurance-
Manage Teamview, edit
Usage Metrics-
Threat Feeds-
Web Application Firewall-
Container Threat Detection-
Dashboards-

Cluster Connection Admin

The Cluster Connection Admin role has administrative capabilities of managed clusters.

FeaturePermission Level
Service Graph and Flow Visualizer-
Policies-
Nodes and Endpoints-
Network Sets-
Managed Clustersview, edit, delete
Compliance Reports-
Timeline-
Alerts-
Kibana-
Image Assurance-
Manage Team-
Usage Metrics-
Threat Feeds-
Web Application Firewall-
Container Threat Detection-
Dashboards-

Viewer

The Viewer role provides read-only access to most operational and configuration data within Calico Cloud. Ideal for users who need visibility without making changes.

FeaturePermission Level
Service Graph and Flow Visualizerview
Policiesview
Nodes and Endpointsview
Network Setsview
Managed Clustersview
Compliance Reportsview
Timelineview
Alertsview
Kibanaview
Image Assurance-
Manage Teamview
Usage Metrics-
Threat Feedsview
Web Application Firewallview
Container Threat Detectionview
Dashboardsview

DevOps

The DevOps role is designed for users responsible for application deployment, CI/CD integration, and managing network policies and configurations relevant to their applications.

FeaturePermission Level
Service Graph and Flow Visualizerview
Policiesview, edit
Nodes and Endpointsview
Network Setsview, edit
Managed Clustersview, edit
Compliance Reports-
Timelineview
Alertsview, edit
Kibanaview, edit
Image Assuranceview, edit
Manage Teamview
Usage Metrics-
Threat Feedsview, edit
Web Application Firewallview
Container Threat Detectionview
Dashboardsview

Security

The Security role focuses on security posture management, including policy definition, threat monitoring, vulnerability management (Image Assurance), and incident response.

FeaturePermission Level
Service Graph and Flow Visualizerview
Policiesview, edit
Nodes and Endpointsview
Network Setsview, edit
Managed Clustersview
Compliance Reportsview
Timelineview
Alertsview, edit
Kibanaview, edit
Image Assuranceview, edit
Manage Teamview
Usage Metrics-
Threat Feedsview, edit
Web Application Firewallview, edit
Container Threat Detectionview, edit
Dashboardsview

Compliance

The Compliance role provides focused access to compliance reporting and related policy information, suitable for auditors or compliance officers.

FeaturePermission Level
Service Graph and Flow Visualizer-
Policiesview
Nodes and Endpointsview
Network Sets-
Managed Clusters-
Compliance Reportsview
Timeline-
Alerts-
Kibana-
Image Assurance-
Manage Team-
Usage Metrics-
Threat Feeds-
Web Application Firewall-
Container Threat Detection-
Dashboards-

Usage Metrics

This role grants specific access to view usage metrics for the Calico Cloud account.

FeaturePermission Level
Service Graph and Flow Visualizer-
Policies-
Nodes and Endpoints-
Network Sets-
Managed Clusters-
Compliance Reports-
Timeline-
Alerts-
Kibana-
Image Assurance-
Manage Team-
Usage Metricsview
Threat Feeds-
Web Application Firewall-
Container Threat Detection-
Dashboards-

Image Assurance Admin

This role provides administrative control specifically over the Image Assurance feature, including configuring registries, policies, and viewing scan results.

FeaturePermission Level
Service Graph and Flow Visualizer-
Policies-
Nodes and Endpoints-
Network Sets-
Managed Clusters-
Compliance Reports-
Timeline-
Alerts-
Kibana-
Image Assuranceview, edit
Manage Team-
Usage Metrics-
Threat Feeds-
Web Application Firewall-
Container Threat Detection-
Dashboards-

Dashboards Admin

This role grants administrative permissions specifically for creating, managing, and sharing custom dashboards within Calico Cloud.

FeaturePermission Level
Service Graph and Flow Visualizer-
Policies-
Nodes and Endpoints-
Network Sets-
Managed Clusters-
Compliance Reports-
Timeline-
Alerts-
Kibana-
Image Assurance-
Manage Team-
Usage Metrics-
Threat Feeds-
Web Application Firewall-
Container Threat Detection-
Dashboardsview, edit

Add your own identity provider

Calico Cloud works with any identity provider that supports OpenID Connect. For example, OKTA, Google, and Azure AD.

To add an identity provider, open a Support ticket.

Azure AD requirements

To add Azure AD as your identity provider, create an Active Directory "App Registration" with a Redirect URI of type "Web" set to https://auth.calicocloud.io/login/callback.

Enable "ID Token" for implicit flows.

Add the following Microsoft Graph API delegated permissions:

  • User.Read
  • OpenId permissions:
    • email
    • openid
    • profile