mirror of
https://github.com/openshift/openshift-docs.git
synced 2026-02-05 12:46:18 +01:00
48 lines
2.2 KiB
Plaintext
48 lines
2.2 KiB
Plaintext
// Module included in the following assemblies:
|
|
//
|
|
// * osd_install_access_delete_cluster/config-identity-providers.adoc
|
|
// * rosa_install_access_delete_clusters/rosa-sts-config-identity-providers.adoc
|
|
|
|
:_mod-docs-content-type: CONCEPT
|
|
[id="understanding-idp_{context}"]
|
|
= Understanding identity providers
|
|
|
|
{product-title} includes a built-in OAuth server. Developers and administrators obtain OAuth access tokens to authenticate themselves to the API. As an administrator, you can configure OAuth to specify an identity provider after you install your cluster. Configuring identity providers allows users to log in and access the cluster.
|
|
|
|
[id="understanding-idp-supported_{context}"]
|
|
== Supported identity providers
|
|
// This section is sourced from authentication/understanding-identity-provider.adoc
|
|
|
|
You can configure the following types of identity providers:
|
|
|
|
[cols="2a,8a",options="header"]
|
|
|===
|
|
|
|
|Identity provider
|
|
|Description
|
|
|
|
|GitHub or GitHub Enterprise
|
|
|Configure a GitHub identity provider to validate usernames and passwords against GitHub or GitHub Enterprise's OAuth authentication server.
|
|
|
|
|GitLab
|
|
|Configure a GitLab identity provider to use link:https://gitlab.com/[GitLab.com] or any other GitLab instance as an identity provider.
|
|
|
|
|Google
|
|
|Configure a Google identity provider using link:https://developers.google.com/identity/protocols/OpenIDConnect[Google's OpenID Connect integration].
|
|
|
|
|LDAP
|
|
|Configure an LDAP identity provider to validate usernames and passwords against an LDAPv3 server, using simple bind authentication.
|
|
|
|
|OpenID Connect
|
|
|Configure an OpenID Connect (OIDC) identity provider to integrate with an OIDC identity provider using an link:http://openid.net/specs/openid-connect-core-1_0.html#CodeFlowAuth[Authorization Code Flow].
|
|
|
|
|htpasswd
|
|
|Configure an htpasswd identity provider for a single, static administration user. You can log in to the cluster as the user to troubleshoot issues.
|
|
|
|
[IMPORTANT]
|
|
====
|
|
The htpasswd identity provider option is included only to enable the creation of a single, static administration user. htpasswd is not supported as a general-use identity provider for {product-title}. For the steps to configure the single user, see _Configuring an htpasswd identity provider_.
|
|
====
|
|
|
|
|===
|