This repository was archived by the owner on Jan 21, 2026. It is now read-only.
🙏 K8s-Dashboard OIDC authentication works, but Dashboard ignores user / group RBAC #10437
bhagatdharmendra
started this conversation in
Ideas
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Description
I’ve secured Kubernetes Dashboard using Keycloak (OIDC) via oauth-proxy.
Authentication works perfectly — users log in via Keycloak and the Dashboard UI opens.
However, authorization is not applied per user or per group.
Even when:
Dashboard always uses its own ServiceAccount to access the Kubernetes API, so all users get the same permissions.
This makes it impossible to provide:
Expected behavior
When OIDC is enabled, it would be great if:
Dashboard could forward the user’s OIDC identity (user / groups)
Kubernetes RBAC could be evaluated per user, similar to kubectl, ArgoCD, or Rancher
Why this matters
In real environments, access is usually managed via:
Right now, the only options are:
Or not using Dashboard at all
Just wanted to share this limitation and check if there’s any roadmap or recommended approach.
Thanks for reading 🙏
Beta Was this translation helpful? Give feedback.
All reactions