- Local users
- Users authenticated via Single Sign-On (SSO) (for example, through Okta or similar products)
It is best practice to disable the default admin user after setting up additional accounts to minimize security risks.
Configuring Local Users
Local users in ArgoCD are managed by updating the ConfigMap. Each user is defined with associated capabilities, such as API key generation and UI login access. The API key capability allows a user to create a JSON Web Token (JWT) for API interactions, while the login capability grants access to the user interface. After editing the ConfigMap, your user list might appear as shown below:Updating User Passwords
ArgoCD provides CLI commands to set or update user passwords. When logged in as the admin, you must enter the current admin password to change another user’s password. Note that new users do not have access until their password is configured. ArgoCD comes with two predefined roles:- Read-only: Grants users access solely to view resources.
- Admin: Grants users full, unrestricted access.
Customizing Roles
The default read-only role enables users to view all resources without making modifications. To assign custom roles or modify role assignments, you must edit the ArgoCD RBAC ConfigMap. By configuring these settings, you can ensure that users without explicit role mappings are automatically granted a default read-only role. For a more comprehensive understanding of role-based access control (RBAC) in ArgoCD and to explore detailed configurations, refer to the official ArgoCD documentation.For more insights into secure user management and RBAC configuration in ArgoCD, consider exploring additional resources on Kubernetes RBAC and cloud-native security best practices.