- Home
- Administration
- Certificate Admin Role - UI
Certificate Admin Role - UI
This guide walks through creating a custom RBAC role using the F5 Distributed Cloud Console UI. The role grants access to manage SSL/TLS certificates and certificate chains used by HTTP Load Balancers. For the programmatic (API) approach, see the API guide.
How F5 XC RBAC Works
Section titled “How F5 XC RBAC Works”F5 XC uses a three-tier permission model:
api_group_element (read-only, system-defined) │ ▼ api_group (read-only, system-defined) │ ▼ role (full CRUD — this is what you create)-
api_group_element— Defines a regex path and HTTP methods (e.g.,POST /api/config/.*/certificates). System-managed; you cannot create, modify, or delete these. -
api_group— A named collection ofapi_group_elementreferences, organized by functional area. System-managed; you cannot create, modify, or delete these. Groups use naming conventions likeves-io-proxy-readorf5xc-waap-standard-admin. -
role— Referencesapi_groupnames in an array. This is the only tier you create. Use the custom role endpoints to attach specificapi_groupsto a role.
By selecting the proxy read/write groups, the example-cert-admin role grants SSL/TLS
certificate management as part of broader proxy resource access.
Scope and Limitations
Section titled “Scope and Limitations”Selecting the proxy read/write groups grants access to all proxy resources in the assigned namespace — HTTP Load Balancers, origins, routes, and certificates alike. There is no way to restrict the role to certificates only.
F5 XC does not support user-created api_group or api_group_element
objects. The platform pre-defines these as read-only, and roles can only
reference existing group names. No system-defined group is scoped exclusively
to certificate operations.
Mitigation — namespace isolation: Place certificate resources in a
dedicated namespace and scope the example-cert-admin role to that namespace. This
prevents the user from accessing proxy resources in other namespaces while
still granting full certificate management within the isolated namespace.
Prerequisites
Section titled “Prerequisites”- Admin access to the F5 Distributed Cloud Console
Step 1: Navigate to Role Management
Section titled “Step 1: Navigate to Role Management”- Log in to the F5 Distributed Cloud Console
- Click the Administration tile on the home page
- In the left navigation menu, select IAM > Roles
- Click + Add Role
Step 2: Name the Role
Section titled “Step 2: Name the Role”Enter example-cert-admin in the Role Name field.
Role naming rules:
- Lowercase letters, numbers, and hyphens only
- Must start with two lowercase letters
- Maximum 64 characters
Step 3: Add Proxy API Groups
Section titled “Step 3: Add Proxy API Groups”Certificate permissions are part of the proxy functional area. Add the following API groups to grant certificate management access:
- Click + Allowed API Groups
- In the search/filter field, type
ves-io-proxy - Select the following API groups:
| API Group | Grants |
|---|---|
ves-io-proxy-read | Read access to proxy resources including certificates |
ves-io-proxy-write | Write access to proxy resources including certificates |
- Click Save to confirm the selected API groups
Step 4: Save the Role
Section titled “Step 4: Save the Role”Review the selected API groups in the summary, then click Save to create the role.
Step 5: Verify the Role
Section titled “Step 5: Verify the Role”- Navigate to IAM > Roles
- Click example-cert-admin in the role list
- Confirm both API groups are listed