UiPath Documentation
automation-suite
2024.10
false
UiPath logo, featuring letters U and I in white

Automation Suite on OpenShift installation guide

Last updated Mar 26, 2026

Security and compliance

Security context for UiPath® services

This section provides details on the security context of the UiPath® services.

All UiPath® services are configured with a security context defined in their spec section.

The following sample shows a typical configuration for UiPath® services:

spec:
  securityContext:
    runAsNonRoot: true
  containers:
    - securityContext:
        allowPrivilegeEscalation: false
        privileged: false
        readOnlyRootFilesystem: true
        capabilities:
          drop: ["ALL"]
  hostPID: false
  hostNetwork: false
spec:
  securityContext:
    runAsNonRoot: true
  containers:
    - securityContext:
        allowPrivilegeEscalation: false
        privileged: false
        readOnlyRootFilesystem: true
        capabilities:
          drop: ["ALL"]
  hostPID: false
  hostNetwork: false

For some UiPath® services, there are exceptions from the typical security context configuration:

  • Insights has multiple features that use the Chromium Linux SUID Sandbox. While elevated access is not required for installing Insights, it is essential for specific feature functionality. For more information, see Configuring the Insights custom security context.
  • Process Mining uses the following Airflow services whose security context differs from the typical configuration for UiPath® services:
    • The statsd service, as shown in the following sample:
      securityContext:
          runAsUser: 65534
          seLinuxOptions:
            level: s0:c27,c4
      securityContext:
          runAsUser: 65534
          seLinuxOptions:
            level: s0:c27,c4
      
    • The scheduler, webserver, and other Airflow pods, as shown in the following sample:
        securityContext:
          fsGroup: 1000
          runAsGroup: 1000
          runAsNonRoot: true
          runAsUser: 50000
          seLinuxOptions:
            level: s0:c27,c4
          supplementalGroups:
            - 1000
        securityContext:
          fsGroup: 1000
          runAsGroup: 1000
          runAsNonRoot: true
          runAsUser: 50000
          seLinuxOptions:
            level: s0:c27,c4
          supplementalGroups:
            - 1000
      
    • The dynamic runtime pod, as shown in the following sample:
        securityContext:
          fsGroup: 1000
          runAsGroup: 1000
          runAsNonRoot: true
          runAsUser: 1001
          seLinuxOptions:
            level: s0:c27,c4
          supplementalGroups:
            - 1000
        securityContext:
          fsGroup: 1000
          runAsGroup: 1000
          runAsNonRoot: true
          runAsUser: 1001
          seLinuxOptions:
            level: s0:c27,c4
          supplementalGroups:
            - 1000
      

In some instances, the user IDs and group IDs can be greater than or equal to 1000, depending on your environment. Make sure you configure the user and group IDs according to your security principles and your organization's security guidelines.

Networking policies

The following table provides a general guideline for network policies. It includes a list of routes needed for configuring the <uipath> namespace.

SourceDestinationDirectionPortsPolicy typeConditions
All pods in uipathAll externalDenyAllNetworkPolicyDefault deny-all policy
All pods in uipathAll pods in uipathAllowAllNetworkPolicyInternal namespace communication
All pods in uipathKube System DNSEgress53 TCP/UDPNetworkPolicyDNS resolution
All pods in uipathExternal IPsEgressAllNetworkPolicyExternal communication
All pods in uipathIstiodEgressAllNetworkPolicyService mesh control
PrometheusAll pods in uipathIngressCustom scrape portsNetworkPolicyMonitoring access
Istio GatewayAll pods in uipathIngressAllNetworkPolicyGateway traffic
Kube SystemAll pods in uipathIngressAllNetworkPolicySystem access
Redis SystemAll pods in uipathIngress9091/TCPNetworkPolicyRedis monitoring
Listed ServicesRedis NamespaceEgressAllNetworkPolicyRedis access

Cluster privilege requirements

Automation Suite requires the cluster admin role during the installation to automate the entire installation process. Alternatively, you can install Automation Suite with lower permissions. An installation with lower permissions involves some additional steps. For the permissions that the installation requires, see Step 2: Creating the required roles.

FIPS 140-2

Federal Information Processing Standards 140-2 (FIPS 140-2) is a security standard that validates the effectiveness of cryptographic modules.

Automation Suite on can run on FIPS 140-2-enabled machines.

Enabling FIPS 140-2 for new installations

To enable FIPS 140-2 on the machines where you plan to perform a fresh installation of Automation Suite, take the following steps:

  1. Before starting the Automation Suite installation, enable FIPS 140-2 on your machines.

  2. Perform the Automation Suite installation by following the installation instructions in this guide.

    Note:
    • If you install AI Center on a FIPS 140-2-enabled machine and also use Microsoft SQL Server, some additional configuration is required. For details, see SQL requirements for AI Center.
    • Make sure Insights is disabled, as it is not supported on FIPS 140-2. If you need to use Insights, you can deploy it on a dedicated non-FIPS node. For details, refer to How to deploy Insights in a FIPS-enabled cluster.
  3. Set the fips_enabled_nodes flag to true in the input.json file.

  4. Make sure your certificates are FIPS 140-2-compatible.

    Note:

    By default, Automation Suite generates self-signed FIPS 140-2-compatible certificates whose expiry date depends on the type of Automation Suite installation you choose.

    We strongly recommend that you replace these self-signed certificates with CA-issued certificates at installation time. To use Automation Suite on FIPS 140-2-enabled machines, the newly provided certificates must be FIPS 140-2-compatible. For a list of eligible ciphers supported by RHEL, see the RHEL documentation.

    For details on how to add your own FIPS 140-2-compliant token-signing and TLS certificates, see Certificate configuration.

  • Security context for UiPath® services
  • Networking policies
  • Cluster privilege requirements
  • FIPS 140-2
  • Enabling FIPS 140-2 for new installations

Was this page helpful?

Connect

Need help? Support

Want to learn? UiPath Academy

Have questions? UiPath Forum

Stay updated