Skip to main content
Connections

Resource Roles

Resource Roles are a central concept in Hoop.dev that serve as secure bridges between users and your organization’s resources. They enable controlled access to internal services, databases, and other resources while maintaining security and compliance. Resource Roles are defined by the administrator and can be assigned to users and groups.

What is a Resource Role?

A Resource Role is a configurable connection that exposes internal services from your infrastructure to authorized users in a secure and controlled manner. It acts as an intermediary layer that:
  • Provides secure access to internal resources
  • Enforces access control policies
  • Enables monitoring and auditing of resource usage
  • Supports various types of services and protocols

Types of Resources

Hoop.dev supports several types of connections: Databases
  • PostgreSQL, MySQL and many other database systems
Applications
  • TCP forwarding, custom CLI tools, and web services
Custom Resources
  • Ability to connect to specialized resources
  • Support for complex configurations
  • Integration with custom tools and services

Key Features

Access Control

  • Granular permission management
  • Group-based access policies
  • Review processes for sensitive resources

Security

  • Encrypted communication
  • Credential management
  • Audit logging
  • Security policy enforcement

Monitoring and Compliance

  • Activity tracking
  • Usage analytics
  • Compliance reporting
  • Integration with SIEM systems

Resource Components

Resources and Resource Roles in Hoop.dev consist of several components:
  • Name and type
  • Resource specifications
  • Security settings
  • Access control rules
  • Connects to internal resources
  • Manages communication
  • Handles authentication
  • Enforces security policies
  • Integration with external tools
  • Custom functionality
  • Automation capabilities
  • Compliance features

Best Practices

Security First

  • Use strong authentication
  • Implement least privilege access
  • Enable review processes for sensitive resources
  • Regularly audit access patterns

Organization

  • Use clear naming conventions
  • Group related resource roles
  • Document resource role purposes
  • Maintain access control lists

Monitoring

  • Enable logging and auditing
  • Monitor usage patterns
  • Set up alerts for suspicious activity
  • Regular security reviews

Regular Updates

  • Keep software and dependencies up to date
  • Apply security patches promptly
  • Review and update configurations regularly
  • Stay informed about new features and improvements

Managing Resources

Resources and Resource Roles can be managed through:
  1. Web Interface
    • User-friendly management console
    • Real-time monitoring
    • Configuration tools
    • Access control management
  2. API
    • Programmatic access
    • Automation capabilities
    • Integration support
    • Custom implementations
  3. CLI
    • Command-line management
    • Scripting support
    • Automation tools
    • Quick access

Next Steps

To get started with your Resources and Resource Roles:
  1. Set up your first resource
  2. Learn about access management
  3. Explore integration options
  4. Understand the architecture