Skip to content

Latest commit

 

History

History
34 lines (32 loc) · 1.11 KB

File metadata and controls

34 lines (32 loc) · 1.11 KB

OIDC

Please setup OIDC in the group_vars/all.yml. This document don't include step how to setup the OIDC identity provider. If you enable OIDC, you will get client-oidc.kubeconfig located in deployer node. Please distribute this to the user if you want the user to login using OIDC. User can install and setup kube-login plugin.

If you already setup and running the bootstraping. In cases of OIDC, you only need to apply RBAC for accessing Kubernetes cluster from OIDC. For example:

cat <<EOF | kubectl apply -f -
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
  name: oidc-kubernetes-admin
subjects:
- kind: Group
  name: oidc:/kubernetes-admin
  apiGroup: rbac.authorization.k8s.io
roleRef:
  kind: ClusterRole
  name: cluster-admin
  apiGroup: rbac.authorization.k8s.io
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
  name: oidc-kubernetes-view
subjects:
- kind: Group
  name: oidc:/kubernetes-viewer
  apiGroup: rbac.authorization.k8s.io
roleRef:
  kind: ClusterRole
  name: system:public-info-viewer
  apiGroup: rbac.authorization.k8s.io  
EOF