Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Login improvements #2353

Open
1 of 8 tasks
floreks opened this issue Sep 11, 2017 · 16 comments
Open
1 of 8 tasks

Login improvements #2353

floreks opened this issue Sep 11, 2017 · 16 comments
Labels
kind/feature Categorizes issue or PR as related to a new feature. lifecycle/frozen Indicates that an issue or PR should not be auto-closed due to staleness. priority/critical-urgent Highest priority. Must be actively worked on as someone's top priority right now.

Comments

@floreks
Copy link
Member

floreks commented Sep 11, 2017

Tracking issue for further non-critical login improvements.

@cohadar
Copy link

cohadar commented Nov 24, 2017

It would be nice when I login with kubeconfig file to automatically show me the namespace from kubeconfig file instead of just showing default namespace by default.

@pdf
Copy link

pdf commented Mar 9, 2018

Is there a ticket on the core side that tracks implementation of the API features/endpoints required for OIDC to work sensibly in dashboard?

@floreks
Copy link
Member Author

floreks commented Mar 9, 2018

I haven't been following core roadmap lately, so I don't know. We'll try to revisit it after angular migration.

@colemickens
Copy link
Contributor

What's the latest on this? I'm interested in having OIDC auth information published in the kube-public namespace for interested clients to discover, for other reasons, in addition to possibly having the dashboard auth scenario be much simpler.

@maciaszczykm maciaszczykm added priority/critical-urgent Highest priority. Must be actively worked on as someone's top priority right now. and removed priority/P0 labels Jul 31, 2018
@yhaskell
Copy link

It would be also awesome if, when you go to some url (for example, dashboard/#!/log/namespace/pod), and it required sign, it wouldn't forget your url and send you to the page you wanted, and not to overview of default namespace.

@jurgenweber
Copy link

It would be absolutely fantastic if we could get some traction on this.

@erandu
Copy link

erandu commented Jul 1, 2019

Also interested by the feature that @cohadar suggested :

It would be nice when I login with kubeconfig file to automatically show me the namespace from kubeconfig file instead of just showing default namespace by default.

Any news/info about this ?
Thanks

@nandonespolo
Copy link

nandonespolo commented Dec 6, 2019

Is there any integration on access to the dashboard and AWS IAM?

Many thanks.

@sshishov
Copy link

Still waiting for this...

@maciaszczykm
Copy link
Member

@sshishov You can wait or you can contribute. We are not able to do everything instantly with just a few people.

@andloh
Copy link

andloh commented Jul 4, 2020

Any news regarding oidc support? :)

@barnybadzoo
Copy link

I know this things take a long time.. any news about it ?

@floreks
Copy link
Member Author

floreks commented Nov 16, 2020

The main issue is that we don't have anyone willing to work on that right now. Our main focus goes to designing and creating a new standalone gRPC API for Dashboard.

@buji-code
Copy link

What's the status on OIDC support?

@akhil117
Copy link

akhil117 commented May 26, 2023

Allow logging in when a very long token is provided (i.e. Azure with groups, etc.)

What's the status on Allow logging in when a very long token is provided @floreks ?

@juanchovelezpro
Copy link

juanchovelezpro commented Aug 30, 2024

@akhil117 If your organization has a large number of groups, probably you would need to allow only the groups you want to allow in your Cluster to avoid a huge authorization header that will be passed to the Kubernetes Dashboard. To do this you will need to select the groups in Azure AD Enterprise Applications → Search your application → Users and groups, and select the groups you want to authenticate in your cluster

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/feature Categorizes issue or PR as related to a new feature. lifecycle/frozen Indicates that an issue or PR should not be auto-closed due to staleness. priority/critical-urgent Highest priority. Must be actively worked on as someone's top priority right now.
Projects
None yet
Development

No branches or pull requests