When SSO users access a PCD workload cluster, they need Kubernetes RBAC bindings that map their SSO group memberships to cluster permissions. This guide shows how to grant access to SSO groups using Kubernetes ClusterRoleBinding or RoleBinding resources.
Private Cloud Director Kubernetes – v2026.1 and Higher
A workload cluster created in PCD
SSO configured in your PCD deployment
kubectl access to the workload cluster (or access to the PCD UI RBAC section)
Default ClusterRoles
Every PCD workload cluster ships with the standard Kubernetes ClusterRoles that you can reference in your bindings:
Default Tenant RBAC
PCD automatically creates four ClusterRoleBindings in each workload cluster for the tenant that owns it:
Group names follow the pattern <du>-<domain>-<tenant>-<role>, where <du> is the deployment unit name (e.g. mydu), <domain> is the domain name in the PCD (e.g. default), <tenant> is the tenant name, and <role> is one of admin, member, or reader.
You can inspect your own groups by running:
Users assigned to the tenant in PCD automatically receive access through these bindings based on their tenant role. No extra steps are required for tenant users.
Granting Access to Additional SSO Groups
If you need to grant cluster access to SSO users who are not part of the owning tenant, create a binding that references their SSO group name.
There are two types of groups you may encounter:
PCD tenant groups — Automatically created by PCD, following the naming pattern <du>-<domain>-<tenant>-<role> (e.g. mydu-default-app-admin). Use these when granting access to users who already belong to a different PCD tenant.
External SSO groups — Defined in your identity provider (Okta, Azure AD, etc.) and passed through in the token's groups claim (e.g. app-team). Use these when granting access to users managed outside of PCD's tenant model.
The examples below use an external SSO group called app-team.
Option A: Cluster-wide access via ClusterRoleBinding
Grant the SSO group app-team read-only access across the entire cluster:
Option B: Namespace-scoped access via RoleBinding
Grant the SSO group app-team edit access only in the app namespace:
Note: You can reference a ClusterRole in a RoleBinding. The permissions will be scoped to the RoleBinding's namespace.
Option C: Using the PCD UI
Navigate to Kubernetes > RBAC > ClusterRoleBindings
Click Add ClusterRoleBinding
Select the target cluster and the desired ClusterRole
Select the SSO group(s) to bind
Click Add ClusterRoleBinding
Verifying Access
After creating the binding, the SSO user can verify their permissions: