RBAC and Multi-Tenancy

Supporting 5 Teams with Different Access Requirements

Managing a single AAP instance for 5 different teams - each with different security requirements, compliance needs, and access levels - taught me that proper RBAC design is the difference between chaos and control.

Development team needed full access to Dev/QA, zero access to Production. Security team needed read-only everywhere for audits. Operations needed Production access but shouldn't modify job templates. Contractors needed specific, time-limited access.

Without RBAC, we either gave everyone admin (security nightmare) or managed access manually (operational nightmare).

Implementing AAP's RBAC model solved everything: Organization-level isolation, team-based permissions, resource-level access control, and complete audit trails.

What You'll Learn

  • Enterprise RBAC model design patterns

  • Organization and team structure strategies

  • Resource-level permissions (granular control)

  • Auditing and compliance reporting

  • Instance groups for workload isolation

  • Real-world multi-tenancy patterns

AAP RBAC Model

Permission Hierarchy

Built-in Roles

Designing Multi-Tenant Structure

Pattern 1: Team-Based Organizations

Real-world use: Complete isolation between Engineering and Operations organizations. Each manages their own resources independently.

Pattern 2: Environment-Based Organizations

Real-world use: Strict environment separation. Developers can't touch production by design.

Pattern 3: Customer/Project-Based

Team Permission Design

Example: Development Team

Example: SRE Team

Example: Security Auditors

Resource-Level RBAC

Granular Permission Assignment

Permission Matrix Example

Audit and Compliance

Activity Stream

Every action logged:

Compliance Reporting

Query Activity Stream:

Real-world compliance use:

Instance Groups for Isolation

Workload Isolation

Organization-Instance Group Assignment

Real-World RBAC Scenarios

Scenario 1: Contractor Access

Scenario 2: Cross-Team Collaboration

Scenario 3: Emergency Access

Key Takeaways

Organizations provide complete multi-tenancy isolation ✅ Teams group users with consistent permission sets ✅ Resource-level RBAC enables granular control ✅ Activity Stream provides comprehensive audit trail ✅ Instance Groups isolate workload execution ✅ Design RBAC early - harder to retrofit later

What's Next

The next article covers Credentials Management in depth - custom credential types, external vault integration, credential rotation strategies, and security best practices.


Next Article: Credentials Management →


Part of the Ansible Automation Platform 101 Series

Last updated