feat: Add RBAC blog post to website #5861
Draft
+179
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
What this PR does / why we need it:
Adds comprehensive blog post announcing Feast's RBAC capabilities. Post covers:
Example permission configuration from the post:
Post includes architecture diagram showing the four-layer distributed model (management, data, service, security/client layers) and clarifies that RBAC enforcement only applies when using remote Feast services.
Which issue(s) this PR fixes:
Addresses documentation request for RBAC feature announcement.
Misc
Authors: Danielle Martinoli and Francisco Javier Arceo
Original prompt
This section details on the original issue you should resolve
<issue_title>Add blog post on RBAC</issue_title>
<issue_description>Please make a blog post to the website about our RBAC capabilities.
Feast Launches RBAC! 🚀
What is the Feast Permission Model?
Feast now supports Role Based Access Controls (RBAC) so you can secure and govern your data.
If you ever wanted to securely partition your feature store across different teams, the new Feast permissions model is here to make that possible!
This powerful feature allows administrators to configure granular authorization policies, letting them decide which users and groups can access specific resources and what operations they can perform.
The default implementation is based on Role-Based Access Control (RBAC): user roles determine whether a user has permission to perform specific functions on registered resources.
Why is RBAC important for Feast?
Feature stores often operate on sensitive, proprietary data and we want to make sure teams are able to govern the access and control of that data thoughtfully, while benefiting from transparent code and an open source community like Feast.
That’s why we built RBAC using Kubernetes RBAC and OpenID Connect protocol (OIDC), ensuring secure, fine-grained access control in Feast.
What are the Benefits of using Feast Permissions?
Using the Feast Permissions Model offers two key benefits:
How Feast Uses RBAC
Permissions as Feast resources
The RBAC configuration is defined using a new Feast object type called “Permission”. Permissions are registered in the Feast registry and are defined and applied like all the other registry objects, using Python code.
A permission is defined by these three components:
The resource types supported by the permission framework are those defining the customer feature store:
TIP: Check out the Permission APIs in the Feast Python API Documentation to learn more!