Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Cloud Stackland
  • What's new
  • Installation
    • All tutorials
    • Installing Stackland on Yandex BareMetal
    • Setting up external access to a pod in a cluster
    • All guides
    • Projects
    • Resource model
  • Access management
  • Pricing policy
  • Diagnostics and troubleshooting

In this article:

  • Authentication
  • Authentication methods
  • Authentication in the web console
  • Authentication in the Kubernetes API
  • Service access
  • Federations
  • Authorization
  • Kubernetes RBAC
  • Access role bindings
  • Subject types
  • Access levels
  • Cluster level
  • Project level
  • Namespace level
  • Primitive roles
  • stackland:viewer
  • stackland:editor
  • stackland:admin
  • stackland:auditor
  • What's next

Access management

Written by
Yandex Cloud
Updated at April 8, 2026
  • Authentication
    • Authentication methods
    • Authentication in the web console
    • Authentication in the Kubernetes API
    • Service access
    • Federations
  • Authorization
    • Kubernetes RBAC
    • Access role bindings
    • Subject types
  • Access levels
    • Cluster level
    • Project level
    • Namespace level
  • Primitive roles
    • stackland:viewer
    • stackland:editor
    • stackland:admin
    • stackland:auditor
  • What's next

In Stackland, access management includes authentication and authorization. The platforms supports two authorization methods: Kubernetes RBAC and IAM AccessBinding.

AuthenticationAuthentication

Stackland uses Identity and Access Management for authentication. Identity and Access Management serves as a single authentication point for all the platform components.

Authentication methodsAuthentication methods

The platforms supports these authentication methods:

  • Local users: Accounts created directly in Identity and Access Management. This method is best suited for smaller teams or test environments.
  • Federated users: IdP accounts. The supported protocols are SAML, OIDC, and LDAP.
  • Service accounts: Accounts for automation and cross-service communication. These accounts use long-lived tokens or API keys.

Authentication in the web consoleAuthentication in the web console

The Stackland web console is integrated with Identity and Access Management. When logging in, the user is redirected to the authentication page with the login options:

  • Via a username and password of a local user account.
  • Via a corporate IdP (if a federation has been set up).

Authentication in the Kubernetes APIAuthentication in the Kubernetes API

To access the Kubernetes API, use kubeconfig.

Service accessService access

For automation, e.g., from CI/CD systems, you can choose between these two authentication methods:

  • Service account token: Long-lived Kubernetes ServiceAccount token. Suitable for systems not supporting token exchange.
  • API keys: Keys created via Identity and Access Management for access to the APIs of the platform services.

FederationsFederations

With a federation, you can use a corporate identity provider for authentication in Stackland. Use the SAMLFederation resource to configure your SAML federation:

apiVersion: iam.stackland.yandex.cloud/v1alpha1
kind: SAMLFederation
metadata:
  name: corporate-idp
spec:
  issuer: "https://idp.example.com/realms/main"
  ssoUrl: "https://idp.example.com/realms/main/protocol/saml"
  ssoBinding: POST
  autoCreateAccountOnLogin: true
  cookieMaxAge: "12h"
  certificates:
    - name: "idp-signing-cert"
      data: |
        -----BEGIN CERTIFICATE-----
        ...
        -----END CERTIFICATE-----
  groupMapping:
    enabled: true
    mapping:
      - externalId: "idp-admins"
        internalName: "stackland-cluster-admins"

You can enable group mapping for your federation to have the external IdP's groups mapped to groups in Identity and Access Management.

AuthorizationAuthorization

Stackland supports two authorization methods working in parallel:

  • Kubernetes RBAC: Standard Kubernetes access management method used for Kubernetes resources (pods, deployments, services, etc).
  • IAM AccessBinding: Identity and Access Management method of granting permissions to subjects at different levels: clusters, projects, etc.
  • Access to platform services: Implemented through the mechanisms of the platform services themselves, e.g., verification uses the username and password of the actual DBMS.

Kubernetes RBACKubernetes RBAC

Kubernetes RBAC manages access through roles and role bindings. While a role determines the permissions (i.e., what actions on what resources), a binding assigns the role to a subject.

Standard RBAC resources:

Resource

Action scope

Description

ClusterRole

Cluster

Cluster-level permissions

ClusterRoleBinding

Cluster

ClusterRole binding to a subject at the cluster level

Role

Namespace

Permissions within a specific namespace

RoleBinding

Namespace

Binding a role to a subject within a namespace

Stackland additionally provides resources for project-level access management:

Resource

Action scope

Description

ProjectRole

Project

Project-level permissions

ProjectRoleBinding

Project

Binding a role to a subject within all namespaces of the project

Learn more about project roles in Configuring project roles.

Access role bindingsAccess role bindings

Access role bindings are used to manage access to the platform services. A binding binds the subject with a role at a particular resource model level.

Types of bindings:

  • ClusterAccessBinding: Cluster-level binding.
  • ProjectAccessBinding: Project-level binding.
  • AccessBinding: Namespace-level binding.

Example of granting an IAM role at the cluster level:

apiVersion: iam.stackland.yandex.cloud/v1alpha1
kind: ClusterAccessBinding
metadata:
  name: user-admin-role
spec:
  roleID: admin
  subject:
    kind: User
    name: "alice@stackland"

Example of granting a role at the namespace level:

apiVersion: iam.stackland.yandex.cloud/v1alpha1
kind: AccessBinding
metadata:
  name: bob-storage-admin
  namespace: my-namespace
spec:
  roleID: storage.admin
  subject:
    kind: User
    name: "bob@stackland"

Subject typesSubject types

Role bindings support the following subject types:

  • User: Identity and Access Management local user.
  • Group: Identity and Access Management user group.
  • ServiceAccount: Kubernetes service account.
  • FederatedUser: External IdP user.

Access levelsAccess levels

You can grant access at these three resource model levels:

Cluster levelCluster level

For access to all the Stackland cluster's resources.

Mechanism: ClusterRoleBinding and ClusterAccessBinding.

Project levelProject level

For access to all the project's namespaces. Use for:

  • Project administrators.
  • Project team members.
  • CI/CD systems.

Mechanism: ProjectRoleBinding and ProjectAccessBinding.

Namespace levelNamespace level

For access limited to a particular namespace. Use for:

  • Developers working with a particular environment.
  • Service accounts of applications.
  • Restricted access to the resources of the platform services.

Mechanism: RoleBinding and AccessBinding.

Primitive rolesPrimitive roles

In Yandex Cloud Stackland, there are primitive roles you can assign to users and groups via RoleBinding or ClusterRoleBinding, depending on the access scope you need.

stackland:viewerstackland:viewer

Allows you to view all main cluster resources:

  • Pods, services, endpoints, and ConfigMaps.
  • Deployments, daemonsets, statefulsets, and replicasets.
  • Ingress controllers and network policies.
  • Storage classes, persistent volumes.
  • PostgreSQL and Storage resources.
  • Certificates and monitoring.

stackland:editorstackland:editor

Includes all stackland:viewer permissions and enables managing applications:

  • Creating, updating, and deleting pods, services and deployments.
  • Managing ConfigMaps and secrets.
  • Access to pod logs and port forwarding.
  • Managing PostgreSQL and Object Storage resources.
  • Managing certificates and monitoring.

stackland:adminstackland:admin

The stackland:admin role grants full administrative permissions to manage all resources and users in the cluster.

stackland:auditorstackland:auditor

Extended audit permissions include all stackland:viewer permissions as well as permissions to:

  • View secret metadata without their contents.
  • Access RBAC resources (roles and access bindings).
  • View network and security policies.
  • Access certificates and their statuses.

What's nextWhat's next

  • Creating a user
  • Creating a user group
  • Connecting a SAML federation
  • Assigning access permissions
  • Resource model

Was the article helpful?

Previous
Hardware monitoring
Next
Pricing policy
© 2026 Direct Cursus Technology L.L.C.