You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -84,13 +84,12 @@ If you use the following steps to modify your configuration manually after insta
84
84
+
85
85
. Edit the new *_master-config.yaml_* file's `identityProviders` stanza.
86
86
. Copy
87
-
xref:../install_config/configuring_authentication.adoc#basic-auth-example-config[the example `BasicAuthPasswordIdentityProvider` configuration] and paste it to replace the existing stanza.
87
+
xref:../install_config/authentication/configuring_authentication_basic_auth.adoc#basic-auth-example-config[the example `BasicAuthPasswordIdentityProvider` configuration] and paste it to replace the existing stanza.
88
88
. Make the following modifications to the `identityProviders` stanza:
89
89
.. Set the provider `name` to something unique and relevant to your
90
90
deployment. This name is prefixed to the returned user ID to form an identity
91
91
name.
92
-
.. If required,
93
-
xref:../install_config/configuring_authentication.adoc#mapping-identities-to-users[set `mappingMethod`] to control how mappings are established between the
92
+
.. If required, set `mappingMethod` to control how mappings are established between the
94
93
provider's identities and user objects.
95
94
.. Specify the HTTPS `url` to use to connect to a server that accepts credentials in Basic authentication headers.
96
95
.. Optionally, set the `ca` to the certificate bundle to use in order to validate server certificates for the configured URL, or leave it empty to use the system-trusted roots.
@@ -226,30 +225,29 @@ If you use the following steps to modify your configuration manually after insta
226
225
====
227
226
+
228
227
. Edit the new *_master-config.yaml_* file's `identityProviders` stanza.
229
-
. View
230
-
xref:../install_config/configuring_authentication.adoc#reqhead-auth-example-config[the example `RequestHeaderIdentityProvider` configuration]
228
+
. View
229
+
xref:../install_config/authentication/configuring_authentication_request_header.adoc#reqhead-ww-auth-optional[the example RequestHeaderIdentityProvider configuration]
231
230
and use it as a guide to replace the existing stanza.
232
231
. Modify the `identityProviders` stanza based on which headers you plan to
233
232
pass in.
234
233
.. Set the provider `name` to something unique and relevant to your
235
234
deployment. This name is prefixed to the returned user ID to form an identity
to control how mappings are established between the provider's identities and
240
238
user objects.
241
239
.. Set the `challenge` parameter to `true` to redirect unauthenticated
242
240
requests from clients expecting `WWW-Authenticate` challenges.
243
241
.. Set the `provider.challengeURL` parameter to the proxy URL to which to send
244
242
clients expecting `WWW-Authenticate` challenges, like the `oc` CLI client.
245
243
This parameter can include the
246
-
xref:../install_config/configuring_authentication.adoc#RequestHeaderIDP-urlquerytokens[`${url}` and `${query}` tokens]
244
+
xref:../install_config/authentication/configuring_authentication_request_header.adoc#requestheaderidp-urlquerytokens[`${url}` and `${query}` tokens]
247
245
in the query portion of the URL.
248
246
.. Set the `login` parameter to `true` to redirect unauthenticated requests
249
247
from clients expecting login flows.
250
248
.. Set the `provider.loginURL` parameter to the proxy URL to which to send
251
249
clients expecting login flows, like web browser clients. This parameter can include the
252
-
xref:../install_config/configuring_authentication.adoc#RequestHeaderIDP-urlquerytokens[`${url}` and `${query}` tokens]
250
+
xref:../install_config/authentication/configuring_authentication_request_header.adoc#requestheaderidp-urlquerytokens[`${url}` and `${query}` tokens]
253
251
in the query portion of the URL.
254
252
.. Set the `clientCA` parameter to the certificate bundle to use to check
255
253
incoming requests for a valid client certificate before the request's headers
@@ -360,13 +358,12 @@ If you use the following steps to modify your configuration manually after insta
360
358
+
361
359
. Edit the new *_keystoneconfig/master-config.yaml_* file's `identityProviders` stanza.
362
360
. Copy
363
-
xref:../install_config/configuring_authentication.adoc#KeystonePasswordIdentityProvider[the example `KeystonePasswordIdentityProvider` configuration]
361
+
xref:../install_config/authentication/configuring_authentication_keystone.adoc#install-config-configuring-authentication-keystone[the example `KeystonePasswordIdentityProvider` configuration]
364
362
and paste it to replace the existing stanza.
365
363
. Make the following modifications to the `identityProviders` stanza:
366
364
.. Change the provider `name` ("my_keystone_provider") to match your Keystone server.
367
365
This name is prefixed to provider user names to form an identity name.
368
-
.. If required,
369
-
xref:../install_config/configuring_authentication.adoc#mapping-identities-to-users[change `mappingMethod`] to control how mappings are established between the
366
+
.. If required change `mappingMethod` to control how mappings are established between the
370
367
provider's identities and user objects.
371
368
.. Change the `domainName` to the domain name of your OpenStack Keystone server. In Keystone, user names are domain-specific. Only a single domain is supported.
372
369
.. Specify the `url` to use to connect to your OpenStack Keystone server.
@@ -419,7 +416,7 @@ xref:../admin_solutions/user_role_mgmt.adoc#control-user-roles[control user role
419
416
LDAP uses bind operations to authenticate applications, and you can integrate your {product-title} cluster to use LDAPv3 authentication.
420
417
Configuring LDAP authentication allows users to log in to {product-title} with their LDAP credentials.
@@ -479,14 +476,13 @@ If you use the following steps to modify your configuration manually after insta
479
476
+
480
477
. Edit the new *_master-config.yaml_* file's `identityProviders` stanza.
481
478
. Copy
482
-
xref:../install_config/configuring_authentication.adoc#ldap-example-config[the example `LDAPPasswordIdentityProvider` configuration]
479
+
xref:../install_config/authentication/configuring_authentication_ldap.adoc#ldap-example-config[the example `LDAPPasswordIdentityProvider` configuration]
483
480
and paste it to replace the existing stanza.
484
481
. Make the following modifications to the `identityProviders` stanza:
485
482
.. Change the provider `name` ("my_ldap_provider") to something unique and
486
483
relevant to your deployment. This name is prefixed to the returned user name to
487
484
form an identity name.
488
-
.. If required,
489
-
xref:../install_config/configuring_authentication.adoc#mapping-identities-to-users[change `mappingMethod`] to control how mappings are established between the
485
+
.. If required, change `mappingMethod` to control how mappings are established between the
490
486
provider's identities and user objects.
491
487
.. Change `id` to the attribute to use as the identity, which must be unique
492
488
and immutable within the identity provider. This option can accept multiple
@@ -527,7 +523,7 @@ connect using TLS, and `ldap://` URLs are upgraded to TLS. When `true`, no TLS
527
523
connection is made to the server, however, setting this to `true` creates an
528
524
invalid configuration for LDAP.
529
525
.. Define an RFC 2255 URL that
530
-
xref:../install_config/configuring_authentication.adoc#ldap-url[specifies the LDAP host and search parameters] to use.
526
+
xref:../install_config/authentication/configuring_authentication_ldap.adoc#ldap-url[specifies the LDAP host and search parameters] to use.
531
527
. Save your changes and close the file.
532
528
. Start the {product-title} API server, specifying the configuration file you just
533
529
modified:
@@ -650,7 +646,7 @@ hostname that web browsers use to interact with your {product-title} cluster.
650
646
====
651
647
. Edit the new *_master-config.yaml_* file's `identityProviders` stanza.
652
648
. Copy
653
-
xref:../install_config/configuring_authentication.adoc#GitHub[the example `GitHubIdentityProvider` configuration]
649
+
xref:../install_config/authentication/configuring_authentication_github.adoc#github-auth-example-config[the example `GitHubIdentityProvider` configuration]
654
650
and paste it to replace the existing stanza.
655
651
. Make the following modifications to the `identityProviders` stanza:
656
652
.. Change the provider `name` to match the callback URL you configured on
Copy file name to clipboardExpand all lines: admin_solutions/master_node_config.adoc
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -238,7 +238,7 @@ You can then use the password file when configuring xref:config-htpasswd[HTPassw
238
238
239
239
[NOTE]
240
240
====
241
-
For more information on the `htpasswd` command, see xref:../install_config/configuring_authentication.adoc#HTPasswdPasswordIdentityProvider[HTPasswd Identity Provider].
241
+
For more information on the `htpasswd` command, see xref:../install_config/authentication/configuring_authentication_htpasswd.adoc#install-config-configuring-authentication-htpasswd[Configuring the HTPasswd Identity Provider].
<1> The `name` of the OAuth client is used as the `client_id` parameter when making requests to `_<master>_/oauth/authorize` and `_<master>_/oauth/token`.
185
185
<2> The `secret` is used as the `client_secret` parameter when making requests to `_<master>_/oauth/token`.
186
186
<3> The `redirect_uri` parameter specified in requests to `_<master>_/oauth/authorize` and `_<master>_/oauth/token` must be equal to (or prefixed by) one of the URIs in `redirectURIs`.
187
-
<4> The `grantMethod` is used to determine what action to take when this client requests tokens and has not yet been granted access by the user. Uses the same values seen in xref:../../install_config/configuring_authentication.adoc#grant-options[Grant Options].
187
+
<4> The `grantMethod` is used to determine what action to take when this client requests tokens and has not yet been granted access by the user. Uses the same values seen in xref:../../install_config/authentication/configuring_authentication_oauth_options.adoc#install-config-configuring-authentication-oauth-grant[Grant Options].
188
188
====
189
189
190
190
[[service-accounts-as-oauth-clients]]
@@ -553,7 +553,7 @@ All requests for OAuth tokens involve a request to `_<master>_/oauth/authorize`.
553
553
Most authentication integrations place an authenticating proxy in front of this
554
554
endpoint, or configure {product-title} to validate credentials against a backing
Setting the `AllowAllPasswordIdentityProvider` in the `identityProviders` stanza allows any non-empty user name and password to log in. This is the default
21
+
identity provider when running {product-title} without a
. Specify the `mappingMethod` parameter to determine how identities are mapped to users.
67
+
//tag::configuring_authentication_common_steps2[]
68
+
+
69
+
----
70
+
oauthConfig:
71
+
...
72
+
identityProviders:
73
+
- mappingMethod: claim
74
+
----
75
+
+
76
+
[cols="2,8"]
77
+
|===
78
+
|Parameter | Description
79
+
80
+
|`claim` | The default value. Provisions a user with the identity's preferred
81
+
user name. Fails if a user with that user name is already mapped to another
82
+
identity.
83
+
84
+
|`lookup` | Looks up an existing identity, user identity mapping, and user,
85
+
but does not automatically provision users or identities. This allows cluster
86
+
administrators to set up identities and users manually, or using an external
87
+
process. For more information on provisioning users with the `lookup` method,
88
+
see xref:../../install_config/authentication/configuring_authentication_mapping_method.adoc#install-config-configuring-authentication-lookup[Manually Provisioning a User When Using the Lookup Mapping Method].
89
+
90
+
|`generate` | Provisions a user with the identity's preferred user name. If a
91
+
user with the preferred user name is already mapped to an existing identity, a
92
+
unique user name is generated. For example, `myuser2`. This method should not be
93
+
used in combination with external processes that require exact matches between
94
+
{product-title} user names and identity provider user names, such as LDAP group
95
+
sync.
96
+
97
+
|`add` | Provisions a user with the identity's preferred user name. If a user
98
+
with that user name already exists, the identity is mapped to the existing user,
99
+
adding to any existing identity mappings for the user. Required when multiple
100
+
identity providers are configured that identify the same set of users and map to
101
+
the same user names.
102
+
|===
103
+
//end::configuring_authentication_common_steps2[]
104
+
105
+
. Specify the following values to configure the Allow All provider:
106
+
+
107
+
.Master Configuration Using `AllowAllPasswordIdentityProvider`
108
+
====
109
+
110
+
----
111
+
oauthConfig:
112
+
...
113
+
identityProviders:
114
+
- challenge: true
115
+
login: true
116
+
mappingMethod: claim
117
+
name: my_allow_provider <1>
118
+
provider:
119
+
apiVersion: v1
120
+
kind: AllowAllPasswordIdentityProvider <2>
121
+
----
122
+
<1> This provider name is prefixed to provider user names to form an identity
123
+
name.
124
+
<2> Specify *_AllowAllPasswordIdentityProvider_* as the provider kind.
0 commit comments