Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

oidc: document oidc prefix flags and add note about Okta #5884

Merged
merged 1 commit into from
Nov 2, 2017

Conversation

ericchiang
Copy link
Contributor

@ericchiang ericchiang commented Oct 12, 2017

Document the new --oidc-[group|username]-prefix flags and add a note about Okta's refreshing. Also remove the "extra-scopes" field since it's no longer used (kubernetes/kubernetes#45317).

cc @kubernetes/sig-auth-pr-reviews

Docs for kubernetes/kubernetes#50875
Closes kubernetes/kubernetes#36847


This change is Reviewable

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/S Denotes a PR that changes 10-29 lines, ignoring generated files. labels Oct 12, 2017
@k8sio-netlify-preview-bot
Copy link
Collaborator

k8sio-netlify-preview-bot commented Oct 12, 2017

Deploy preview ready!

Built with commit 13fae14

https://deploy-preview-5884--kubernetes-io-master-staging.netlify.com

Kubernetes names (such as the `system:` users). For example, if the provider
URL is `https://accounts.google.com` and the username claim maps to `jane`, the
plugin will authenticate the user as:
If `--oidc-username-prefix` isn't provided and `--oidc-username-claim` is set to
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

can we hoist this into the table? I expected to see the default behavior and opt out info by the param there

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yeah, update

@ericchiang ericchiang force-pushed the oidc-new-flags branch 2 times, most recently from 41aafde to c85b918 Compare October 12, 2017 20:03
The first option is to use the `oidc` authenticator. This authenticator takes your `id_token`, `refresh_token` and your OIDC `client_secret` and will refresh your token automatically. Once you have authenticated to your identity provider:
The first option is to use the kubectl `oidc` authenticator, which set the `id_token` as a bearer token for all requests and refreshes the token once it expires. After you've logged into your provider, use kubectl to add your `id_token`, `refresh_token`, `client_id`, and `client_secret` to configure the plugin.

Providers that don't return an `id_token` as part of their refresh token response (e.g. [Okta](https://developer.okta.com/docs/api/resources/oidc.html#response-parameters-4)) aren't supported by this plugin and should use "Option 2" below.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

which set -> which sets

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thanks for the review. updated

@steveperry-53
Copy link
Contributor

@ericchiang @liggitt One comment in the text. Otherwise, Docs LGTM.

@steveperry-53
Copy link
Contributor

@liggitt Are you ready to give tech approval? Thanks.

@liggitt
Copy link
Member

liggitt commented Nov 2, 2017

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Nov 2, 2017
@steveperry-53 steveperry-53 merged commit aaffdb8 into kubernetes:master Nov 2, 2017
tengqm pushed a commit to tengqm/website that referenced this pull request Nov 6, 2017
bsteciuk pushed a commit to bsteciuk/kubernetes.github.io that referenced this pull request Dec 1, 2017
@ericchiang ericchiang deleted the oidc-new-flags branch December 5, 2017 16:21
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Refresh token requires id_token in response but openid spec it is optional
6 participants