You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/zh-cn/docs/reference/access-authn-authz/authentication.md
+35-26Lines changed: 35 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -547,7 +547,7 @@ To enable the plugin, configure the following flags on the API server:
547
547
<!--
548
548
| Parameter | Description | Example | Required |
549
549
| --------- | ----------- | ------- | ------- |
550
-
| `--oidc-issuer-url` | URL of the provider which allows the API server to discover public signing keys. Only URLs which use the `https://` scheme are accepted. This is typically the provider's discovery URL without a path, for example "https://accounts.google.com" or "https://login.salesforce.com". This URL should point to the level below .well-known/openid-configuration | If the discovery URL is `https://accounts.google.com/.well-known/openid-configuration`, the value should be `https://accounts.google.com` | Yes |
550
+
| `--oidc-issuer-url` | URL of the provider that allows the API server to discover public signing keys. Only URLs that use the `https://` scheme are accepted. This is typically the provider's discovery URL, changed to have an empty path | If the issuer's OIDC discovery URL is `https://accounts.provider.example/.well-known/openid-configuration`, the value should be `https://accounts.google.com` | Yes |
551
551
| `--oidc-client-id` | A client id that all tokens must be issued for. | kubernetes | Yes |
552
552
| `--oidc-username-claim` | JWT claim to use as the user name. By default `sub`, which is expected to be a unique identifier of the end user. Admins can choose other claims, such as `email` or `name`, depending on their provider. However, claims other than `email` will be prefixed with the issuer URL to prevent naming clashes with other plugins. | sub | No |
553
553
| `--oidc-username-prefix` | Prefix prepended to username claims to prevent clashes with existing names (such as `system:` users). For example, the value `oidc:` will create usernames like `oidc:jane.doe`. If this flag isn't provided and `--oidc-username-claim` is a value other than `email` the prefix defaults to `( Issuer URL )#` where `( Issuer URL )` is the value of `--oidc-issuer-url`. The value `-` can be used to disable all prefixing. | `oidc:` | No |
@@ -560,7 +560,7 @@ To enable the plugin, configure the following flags on the API server:
If your cluster has the API enabled, you can use the `SelfSubjectReview` API to find out how your Kubernetes cluster maps your authentication information to identify you as a client. This works whether you are authenticating as a user (typically representing a real person) or as a ServiceAccount.
@@ -2015,12 +2015,12 @@ Kubernetes API 服务器收到请求后,将使用用户属性填充 status 字
2015
2015
请求示例(主体将是 `SelfSubjectReview`):
2016
2016
2017
2017
```
2018
-
POST /apis/authentication.k8s.io/v1beta1/selfsubjectreviews
2018
+
POST /apis/authentication.k8s.io/v1/selfsubjectreviews
2019
2019
```
2020
2020
2021
2021
```json
2022
2022
{
2023
-
"apiVersion": "authentication.k8s.io/v1beta1",
2023
+
"apiVersion": "authentication.k8s.io/v1",
2024
2024
"kind": "SelfSubjectReview"
2025
2025
}
2026
2026
```
@@ -2032,7 +2032,7 @@ Response example:
2032
2032
2033
2033
```json
2034
2034
{
2035
-
"apiVersion": "authentication.k8s.io/v1beta1",
2035
+
"apiVersion": "authentication.k8s.io/v1",
2036
2036
"kind": "SelfSubjectReview",
2037
2037
"status": {
2038
2038
"userInfo": {
@@ -2119,7 +2119,7 @@ By providing the output flag, it is also possible to print the JSON or YAML repr
2119
2119
2120
2120
{{% tab name="YAML" %}}
2121
2121
```yaml
2122
-
apiVersion: authentication.k8s.io/v1alpha1
2122
+
apiVersion: authentication.k8s.io/v1
2123
2123
kind: SelfSubjectReview
2124
2124
status:
2125
2125
userInfo:
@@ -2142,10 +2142,12 @@ status:
2142
2142
2143
2143
<!--
2144
2144
This feature is extremely useful when a complicated authentication flow is used in a Kubernetes cluster,
2145
-
for example, if you use [webhook token authentication](/docs/reference/access-authn-authz/authentication/#webhook-token-authentication) or [authenticating proxy](/docs/reference/access-authn-authz/authentication/#authenticating-proxy).
2145
+
for example, if you use [webhook token authentication](/docs/reference/access-authn-authz/authentication/#webhook-token-authentication)
2146
+
or [authenticating proxy](/docs/reference/access-authn-authz/authentication/#authenticating-proxy).
By default, all authenticated users can create `SelfSubjectReview` objects when the `APISelfSubjectReview` feature is enabled. It is allowed by the `system:basic-user` cluster role.
2167
+
By default, all authenticated users can create `SelfSubjectReview` objects when the `APISelfSubjectReview` feature is enabled.
2168
+
It is allowed by the `system:basic-user` cluster role.
0 commit comments