2019-03-18 10:23:14 -04:00
|
|
|
[id="understanding-identity-provider"]
|
2019-01-07 12:36:45 -05:00
|
|
|
= Understanding identity provider configuration
|
|
|
|
|
include::modules/common-attributes.adoc[]
|
|
|
|
|
:context: understanding-identity-provider
|
|
|
|
|
toc::[]
|
|
|
|
|
|
|
|
|
|
The {product-title} master includes a built-in OAuth server. Developers and
|
|
|
|
|
administrators obtain OAuth access tokens to authenticate themselves to the API.
|
|
|
|
|
|
|
|
|
|
As an administrator, you can configure OAuth to specify an identity provider
|
|
|
|
|
after you install your cluster.
|
|
|
|
|
|
|
|
|
|
include::modules/identity-provider-overview.adoc[leveloffset=+1]
|
|
|
|
|
|
2019-03-18 10:23:14 -04:00
|
|
|
[id="supported-identity-providers"]
|
2019-01-07 12:36:45 -05:00
|
|
|
== Supported identity providers
|
|
|
|
|
|
|
|
|
|
You can configure the following types of identity providers:
|
|
|
|
|
|
|
|
|
|
[cols="2a,8a",options="header"]
|
|
|
|
|
|===
|
|
|
|
|
|
|
|
|
|
|Identity provider
|
|
|
|
|
|Description
|
|
|
|
|
|
2019-05-22 21:54:46 +10:00
|
|
|
|xref:../authentication/identity_providers/configuring-htpasswd-identity-provider.adoc#configuring-htpasswd-identity-provider[HTPasswd]
|
2019-01-07 12:36:45 -05:00
|
|
|
|Configure the `htpasswd` identity provider to validate user names and passwords
|
|
|
|
|
against a flat file generated using
|
|
|
|
|
link:http://httpd.apache.org/docs/2.4/programs/htpasswd.html[`htpasswd`].
|
|
|
|
|
|
2019-05-22 21:54:46 +10:00
|
|
|
|xref:../authentication/identity_providers/configuring-keystone-identity-provider.adoc#configuring-keystone-identity-provider[Keystone]
|
2019-01-07 12:36:45 -05:00
|
|
|
|Configure the `keystone` identity provider to integrate
|
|
|
|
|
your {product-title} cluster with Keystone to enable shared authentication with
|
|
|
|
|
an OpenStack Keystone v3 server configured to store users in an internal
|
|
|
|
|
database.
|
|
|
|
|
|
2019-05-22 21:54:46 +10:00
|
|
|
|xref:../authentication/identity_providers/configuring-ldap-identity-provider.adoc#configuring-ldap-identity-provider[LDAP]
|
2019-01-07 12:36:45 -05:00
|
|
|
|Configure the `ldap` identity provider to validate user names and passwords
|
|
|
|
|
against an LDAPv3 server, using simple bind authentication.
|
|
|
|
|
|
2019-05-22 21:54:46 +10:00
|
|
|
|xref:../authentication/identity_providers/configuring-basic-authentication-identity-provider.adoc#configuring-basic-authentication-identity-provider[Basic authentication]
|
2019-01-07 12:36:45 -05:00
|
|
|
|Configure a `basic-authentication` identity provider for users to log in to
|
|
|
|
|
{product-title} with credentials validated against a remote identity provider.
|
|
|
|
|
Basic authentication is a generic backend integration mechanism.
|
|
|
|
|
|
2019-05-22 21:54:46 +10:00
|
|
|
|xref:../authentication/identity_providers/configuring-request-header-identity-provider.adoc#configuring-request-header-identity-provider[Request header]
|
2019-01-07 12:36:45 -05:00
|
|
|
|Configure a `request-header` identity provider to identify users from request
|
|
|
|
|
header values, such as `X-Remote-User`. It is typically used in combination with
|
|
|
|
|
an authenticating proxy, which sets the request header value.
|
|
|
|
|
|
2019-05-22 21:54:46 +10:00
|
|
|
|xref:../authentication/identity_providers/configuring-github-identity-provider.adoc#configuring-github-identity-provider[GitHub or GitHub Enterprise]
|
2019-01-07 12:36:45 -05:00
|
|
|
|Configure a `github` identity provider to validate user names and passwords
|
|
|
|
|
against GitHub or GitHub Enterprise's OAuth authentication server.
|
|
|
|
|
|
2019-05-22 21:54:46 +10:00
|
|
|
|xref:../authentication/identity_providers/configuring-gitlab-identity-provider.adoc#configuring-gitlab-identity-provider[GitLab]
|
2019-01-07 12:36:45 -05:00
|
|
|
|Configure a `gitlab` identity provider to use
|
|
|
|
|
link:https://gitlab.com/[GitLab.com] or any other GitLab instance as an identity
|
|
|
|
|
provider.
|
|
|
|
|
|
2019-05-22 21:54:46 +10:00
|
|
|
|xref:../authentication/identity_providers/configuring-google-identity-provider.adoc#configuring-google-identity-provider[Google]
|
2019-01-07 12:36:45 -05:00
|
|
|
|Configure a `google` identity provider using
|
|
|
|
|
link:https://developers.google.com/identity/protocols/OpenIDConnect[Google's OpenID Connect integration].
|
|
|
|
|
|
2019-05-22 21:54:46 +10:00
|
|
|
|xref:../authentication/identity_providers/configuring-oidc-identity-provider.adoc#configuring-oidc-identity-provider[OpenID Connect]
|
2019-01-07 12:36:45 -05:00
|
|
|
|Configure an `oidc` identity provider to integrate with an OpenID Connect
|
|
|
|
|
identity provider using an
|
|
|
|
|
link:http://openid.net/specs/openid-connect-core-1_0.html#CodeFlowAuth[Authorization Code Flow].
|
|
|
|
|
|
|
|
|
|
|===
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
include::modules/identity-provider-parameters.adoc[leveloffset=+1]
|
|
|
|
|
|
2019-02-27 21:15:28 -05:00
|
|
|
include::modules/identity-provider-default-CR.adoc[leveloffset=+1]
|