-
Notifications
You must be signed in to change notification settings - Fork 39.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bedrock auth sources #2202
Comments
@liggitt had implemented several variants of this already in OpenShift - we should work to share the code we have where possible. For instance here https://github.com/openshift/origin/tree/master/pkg/auth/oauth/external there are packages for both google and github, and we have people working on token generation for cut and paste to cli. We've implemented oauth round trip, storage of tokens in etcd, grant flows, login with session cookie, oauth login provider that connects to a backend client credential cert, etc. It's likely something we want in plugins rather than in core kube, with the option to run the server. |
In origin, we have an OAuth server (based on github.com/RangelReale/osin) with pluggable handling of:
For login flows, we currently have:
For grant approval, we have:
For OAuth-related storage, we have:
|
We also will shortly have the "start flow and then give me a page that i can copy and paste the token". As a way of attacking this, I would think we could structure this into a series of pulls to Kube |
All of the login/grant flows make sense as plugins. I have mixed feelings about the OAuth server (and OAuth-related storage)... it makes it really hard for clients to interact in a consistent way if there's not a predicable place to go to start the token request. |
Let me know when you have your pull drafted so we can discuss the specifics. @erictune, do you want to do an auth hangout this week and talk more details? ----- Original Message -----
|
Sure. Why don't you setup whatever sort of hangout works best for you, On Mon, Nov 10, 2014 at 10:41 AM, Clayton Coleman notifications@github.com
|
I'm interested in something along these lines. This ticket is a bit old and I'm not sure how it relates to the auth provider framework introduced in #23066. My use case has Kerberos as the bedrock authentication source. I have written a bearer token issuing/verification service, and point kube-apiserver at it via the webhook token authentication feature. I'm currently wrapping kubectl with a script that authenticates to my service with Kerberos, gets a bearer token, runs kubectl config set-credentials, then execs kubectl. It would be nice if I could eliminate that wrapper script somehow. |
We integrated kerberos into openshift via the challenge client concept, which is vaguely on the roadmap to add to Kube and the eventual |
Issues go stale after 90d of inactivity. Prevent issues from auto-closing with an If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
The APIserver can authenticate users using a Bearer Token.
Currently, these can only be provided in a file, via --token_auth_file.
We should provide a way to get a token from the apiserver based on an external ("bedrock") authentication source.
Steps:
References:
The text was updated successfully, but these errors were encountered: