Skip to content

Conversation

everettraven
Copy link
Contributor

Outlines the plan for adding support for multiple identity providers with the BYO External OIDC feature.

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Sep 30, 2025
@openshift-ci-robot
Copy link

openshift-ci-robot commented Sep 30, 2025

@everettraven: This pull request references CNTRLPLANE-1458 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.21.0" version, but no target version was set.

In response to this:

Outlines the plan for adding support for multiple identity providers with the BYO External OIDC feature.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

Copy link
Contributor

openshift-ci bot commented Sep 30, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign rphillips for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@everettraven
Copy link
Contributor Author

/cc @liouk @sjenning

@openshift-ci openshift-ci bot requested review from liouk and sjenning September 30, 2025 19:02
Copy link
Member

@liouk liouk left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm missing a section that discusses the changes that will be needed for the Console, in particular:

  • changes to how the IDP client secret(s) will be managed
  • hosting the IDP selection page (in oauth, hosted by the oauth-server)

Since this is integral part of the main goal of this feature, we should at least outline the main changes expected.

- everettraven
reviewers: # Include a comment about what domain expertise a reviewer is expected to bring and what area of the enhancement you expect them to focus on. For example: - "@networkguru, for networking aspects, please look at IP bootstrapping aspect"
- liouk # Original author of the ExternalOIDC feature for OpenShift
- TBD # Someone from Console team to cover Console nuances?
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is a good question for @jhadvig 🙂


### Goals

- Add support for configuring more than on external OIDC provider.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe emphasize the fact that they'll be active at the same time.


### Non-Goals

- Anything outside of the above outlined goal.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'd describe "user profiles" as a non-goal to avoid any expectation misunderstandings.


### Goals

- Add support for configuring more than on external OIDC provider.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Add support for configuring more than on external OIDC provider.
- Add support for configuring more than one external OIDC provider.

operations / org specific systems.

To configure the UID of a cluster user identity using a specific claim value on OpenShift, a Cluster Administrator updates the `authentications.config.openshift.io/cluster` resource
to populate the claim mapping like so:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Missing example/snippet here?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Missed delete from a copy-paste of the uid-extra EP, will remove :)

Copy link
Contributor

openshift-ci bot commented Oct 1, 2025

@everettraven: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

jira/valid-reference Indicates that this PR references a valid Jira ticket of any type.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants