Approval policies are a level of governance that you add to exercise control over deployment and day 2 action requests before they are run. You define approval policies in Service Broker so that you, or others that you designate, review requests before resources are consumed or destroyed. The approval policy use cases in this procedure are an introduction that you can use as you explore your governance options.
If you have only a small team adding and deploying catalog items, then approval policies might be less useful. But as you make the catalog available to a larger group of developers and general consumers, you can use the approval policies to ensure that someone reviews a request before the resources are consumed or changes are made to the provisioned items.
For example, you have a catalog item that is important, but it consumes a significant amount of resources. You want one of your IT administrators to review any deployment requests to ensure that the request is needed. Another example applies to day 2 actions. Making changes to a deployment that is used by many might be devastating. You want the project administrator who manages the deployment for that team to review all changes to the deployed catalog item.
Who works with or is affected by approval policies?
- Service Broker administrator. Configures the policies.
- Catalog consumers. Users who request catalog items or day 2 actions to which one or more policies apply.
- Users deploying cloud templates in Cloud Assembly. Users who request templates or day 2 actions in Cloud Assembly to which one or more policies apply.
- Designated approvers. Users who must review and then approve or reject a request. You can grant approver rights to selected users and user groups, or you can choose from the following approver roles.
- AD Manager. Active Directory user with manager attributes. See Configure Active Directory attributes for the AD Manager approver role
- Project Administrators. Administrators of projects within the policy scope are automatically assigned as approvers. If a project does not have a dedicated administrator, the approval policy is not applied to that project.
- Project Supervisors. Members of projects within the policy scope who are assigned the Supervisor role. Supervisor access rights are limited to approving and rejecting deployment requests for a project. If a project does not have a dedicated supervisor, the approval policy is not applied to that project.
What happens when approval policies are enforced?
Multiple approval policies might be enforceable. The approval policies are evaluated, and an enforced policy is applied to the request. When there are multiple valid policies, where the approvers are different people, all the approvers are added. When you have multiple policies, it is important to understand this process. For more information, see Approval policy goals and enforcement examples.
- Approval policies are defined.
- A user requests a catalog item or day 2 action. At request time, Service Broker evaluates the catalog item to see if any policies apply.
- An approval policy is enforced.
- The deploy card displays the status. For example, Create - Approval Pending.
- An email notification is sent to the requester. See How do I track my requests that require approval in Service Broker.
- An email notification is sent to the approvers. See How do I respond to an approval request in Service Broker.
The deployment does not begin deploying and consuming infrastructure resources, or make changes to a deployed system, until the request is approved. The requesting user is notified by email that the request is waiting for approval.
- The approvers respond to the request using the Approvals page in Service Broker.
- The approval process is completed.
- If the request is rejected, the requesting user is notified and the deployment request is canceled.
- If the request is approved, the deployment proceeds.
- It is possible that the enforced policy is configured to automatically approve or reject a request if the approver does not take any action.
How can I use the deployment criteria?
To limit what items or activities the policy applies to, you can define the deployment criteria. For more about the criteria, see How do I configure deployment criteria in Service Broker policies.
Approval policy constraints
- The change lease action is not available to include in an approval policy.
- Using custom resources as resource type in the policy criteria is not supported.
As you review the approval policies use case and create your own policy, consult the signpost help on the key text boxes for more information.
Prerequisites
- An approver, who might not be a regular Service Broker or Cloud Assembly user, must have one of the following combination of roles:
- Organization member and Service Broker user
- Organization member and the Manage Approvals custom role
These roles provide the minimum level of permissions and still allow them to approve or reject a request.
- Verify that the email notification server is defined. See Add an email server in Service Broker to send notifications.
- If you plan to use the Active Directory manager as the role-based approval type, you must use the Workspace One Access VMware Identity Manager integration configured for vRealize Automation. You must also include the Active Directory manager attributes in the user attributes. See Configure Active Directory attributes for the AD Manager approver role
Procedure
What to do next
- For more information about how approval policies are processed, see Approval policy goals and enforcement examples.
- For more information about how multi-level approvals are processed, see Configure multi-level approval policies in Service Broker.
- For more about the consumer and approver experience, see How do I track my requests that require approval in Service Broker and How do I respond to an approval request in Service Broker.