-
Notifications
You must be signed in to change notification settings - Fork 520
CNTRLPLANE-1458: (authentication): external oidc multiple idp support #1852
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from 1 commit
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change | ||||
---|---|---|---|---|---|---|
@@ -0,0 +1,346 @@ | ||||||
--- | ||||||
title: external-oidc-multiple-idp-support | ||||||
authors: | ||||||
- everettraven | ||||||
reviewers: # Include a comment about what domain expertise a reviewer is expected to bring and what area of the enhancement you expect them to focus on. For example: - "@networkguru, for networking aspects, please look at IP bootstrapping aspect" | ||||||
- liouk # Original author of the ExternalOIDC feature for OpenShift | ||||||
- TBD # Someone from Console team to cover Console nuances? | ||||||
approvers: # A single approver is preferred, the role of the approver is to raise important questions, help ensure the enhancement receives reviews from all applicable areas/SMEs, and determine when consensus is achieved such that the EP can move forward to implementation. Having multiple approvers makes it difficult to determine who is responsible for the actual approval. | ||||||
- sjenning | ||||||
api-approvers: # In case of new or modified APIs or API extensions (CRDs, aggregated apiservers, webhooks, finalizers). If there is no API change, use "None" | ||||||
- JoelSpeed | ||||||
creation-date: 2025-09-30 | ||||||
last-updated: 2025-09-30 | ||||||
tracking-link: # link to the tracking ticket (for example: Jira Feature or Epic ticket) that corresponds to this enhancement | ||||||
- https://issues.redhat.com/browse/CNTRLPLANE-1458 | ||||||
see-also: | ||||||
- "/enhancements/authentication/direct-external-oidc-provider.md" | ||||||
replaces: | ||||||
- none | ||||||
superseded-by: | ||||||
- none | ||||||
--- | ||||||
|
||||||
# External OIDC Multiple IdP Support | ||||||
|
||||||
## Summary | ||||||
|
||||||
Allow users to configure more than one OIDC identity provider when using the BYO External OIDC feature. | ||||||
|
||||||
## Motivation | ||||||
|
||||||
### User Stories | ||||||
|
||||||
- As a cluster administrator, I would like to enable multiple different identity providers so that subsets of my cluster users can use different login methods. | ||||||
|
||||||
### Goals | ||||||
|
||||||
- Add support for configuring more than on external OIDC provider. | ||||||
|
- Add support for configuring more than on external OIDC provider. | |
- Add support for configuring more than one external OIDC provider. |
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd describe "user profiles" as a non-goal to avoid any expectation misunderstandings.
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Missing example/snippet here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Missed delete from a copy-paste of the uid-extra EP, will remove :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is a good question for @jhadvig 🙂