-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Login improvements #2353
Comments
It would be nice when I login with kubeconfig file to automatically show me the namespace from kubeconfig file instead of just showing default namespace by default. |
Is there a ticket on the core side that tracks implementation of the API features/endpoints required for OIDC to work sensibly in dashboard? |
I haven't been following core roadmap lately, so I don't know. We'll try to revisit it after angular migration. |
What's the latest on this? I'm interested in having OIDC auth information published in the |
It would be also awesome if, when you go to some url (for example, |
It would be absolutely fantastic if we could get some traction on this. |
Also interested by the feature that @cohadar suggested :
Any news/info about this ? |
Is there any integration on access to the dashboard and AWS IAM? Many thanks. |
Still waiting for this... |
@sshishov You can wait or you can contribute. We are not able to do everything instantly with just a few people. |
Any news regarding oidc support? :) |
I know this things take a long time.. any news about it ? |
The main issue is that we don't have anyone willing to work on that right now. Our main focus goes to designing and creating a new standalone gRPC API for Dashboard. |
What's the status on OIDC support? |
What's the status on Allow logging in when a very long token is provided @floreks ? |
@akhil117 If your organization has a large number of groups, probably you would need to allow only the groups you want to allow in your Cluster to avoid a huge authorization header that will be passed to the Kubernetes Dashboard. To do this you will need to select the groups in Azure AD Enterprise Applications → Search your application → Users and groups, and select the groups you want to authenticate in your cluster |
Tracking issue for further non-critical login improvements.
In case user logs out his token should be invalidated. We should blacklist it until it expires.
The text was updated successfully, but these errors were encountered: