Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Given a configured keycloak server, is it possible to use this site along with oidc to support multiple users? #872

Closed
lknite opened this issue Jul 2, 2022 · 4 comments

Comments

@lknite
Copy link

lknite commented Jul 2, 2022

I've noticed there is a heimdall oauth2 server so I'm betting there is already an integration available. Maybe?

I've looked into an authenticating proxy:
https://github.com/oauth2-proxy/oauth2-proxy

Which has an example of being an interface in front of the kubernetes dashboard, which knows how to accept the token passed along by the oauth2-proxy. Is it possible heimdall apps also knows how to work with such a token?
https://kubernetes.github.io/ingress-nginx/examples/auth/oauth-external-auth/

@project-bot project-bot bot added this to To do in Issue & PR Tracker Jul 2, 2022
@lknite
Copy link
Author

lknite commented Jul 5, 2022

k, got this working yesterday, have got heimdall setup behind an oauth2-proxy and have set it up to pass along a bearer token

Can heimdall use this token to allow different users access to their own heimdall desktop?

@lknite
Copy link
Author

lknite commented Aug 7, 2022

Updated my clusters and redeployed this again. So far this is my favorite dashboard-type app. Hoping it might be possible to support multiple users / oidc.

@lknite
Copy link
Author

lknite commented Aug 8, 2022

On the heimdall side, my oauth2-proxy configuration in the annotation section:

      annotations:
        # use oauth2-proxy for login & obtain bearer token
        nginx.ingress.kubernetes.io/auth-url: "https://oauth2-proxy.vc-prod.k.home.net/oauth2/auth"
        nginx.ingress.kubernetes.io/auth-signin: "https://oauth2-proxy.vc-prod.k.home.net/oauth2/start?rd=$escaped_request_uri"

        # header to watch for
        nginx.ingress.kubernetes.io/auth-response-headers: authorization

        # in the following everything after $upstream_http_ is the header you want to pass along to target app
        nginx.ingress.kubernetes.io/configuration-snippet: |
          auth_request_set $token $upstream_http_authorization;
          add_header Authorization $token;

@lknite
Copy link
Author

lknite commented Sep 1, 2022

Closing here and opening as a discussion:
#898

@lknite lknite closed this as completed Sep 1, 2022
Issue & PR Tracker automation moved this from To do to Done Sep 1, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Development

No branches or pull requests

1 participant