Understanding identity provider configuration
The OpenShift Container Platform master includes a built-in OAuth server. Developers and administrators obtain OAuth access tokens to authenticate themselves to the API.
As an administrator, you can configure OAuth to specify an identity provider after you install your cluster.
About identity providers in OpenShift Container Platform
By default, only a kubeadmin user exists on your cluster. To specify an
identity provider, you must create a custom resource (CR) that describes
that identity provider and add it to the cluster.
Note
OpenShift Container Platform user names containing /, :, and % are not supported.
Supported identity providers
You can configure the following types of identity providers:
| Identity provider | Description |
|---|---|
Configure the |
|
Configure the |
|
Configure the |
|
Configure a |
|
Configure a |
|
Configure a |
|
Configure a |
|
Configure a |
|
Configure an |
Once an identity provider has been defined, you can use RBAC to define and apply permissions.
Removing the kubeadmin user
After you define an identity provider and create a new cluster-admin
user, you can remove the kubeadmin to improve cluster security.
Warning
If you follow this procedure before another user is a cluster-admin,
then OpenShift Container Platform must be reinstalled. It is not possible to undo
this command.
-
You must have configured at least one identity provider.
-
You must have added the
cluster-adminrole to a user. -
You must be logged in as an administrator.
-
Remove the
kubeadminsecrets:$ oc delete secrets kubeadmin -n kube-system
Identity provider parameters
The following parameters are common to all identity providers:
| Parameter | Description |
|---|---|
|
The provider name is prefixed to provider user names to form an identity name. |
|
Defines how new identities are mapped to users when they log in. Enter one of the following values:
|
Note
When adding or changing identity providers, you can map identities from the new provider to existing users by setting themappingMethod parameter to
add.
Sample identity provider CR
The following custom resource (CR) shows the parameters and default values that you use to configure an identity provider. This example uses the htpasswd identity provider.
apiVersion: config.openshift.io/v1
kind: OAuth
metadata:
name: cluster
spec:
identityProviders:
- name: my_identity_provider
mappingMethod: claim
type: HTPasswd
htpasswd:
fileData:
name: htpass-secret
- This provider name is prefixed to provider user names to form an identity name.
- Controls how mappings are established between this provider’s
identities and
Userobjects. - An existing secret containing a file generated using
htpasswd.
Manually provisioning a user when using the lookup mapping method
Typically, identities are automatically mapped to users during login. The lookup mapping method disables this automatic mapping, which requires you to provision users manually. If you are using the lookup mapping method, use the following procedure for each user after configuring the identity provider.
-
You have installed the OpenShift CLI (
oc).
-
Create an OpenShift Container Platform user:
$ oc create user <username> -
Create an OpenShift Container Platform identity:
$ oc create identity <identity_provider>:<identity_provider_user_id>Where
<identity_provider_user_id>is a name that uniquely represents the user in the identity provider. -
Create a user identity mapping for the created user and identity:
$ oc create useridentitymapping <identity_provider>:<identity_provider_user_id> <username>