You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
// This xref target does not exist in the OSD/ROSA docs.
24
+
ifndef::openshift-dedicated,openshift-rosa[]
23
25
* xref:../nodes/nodes/nodes-nodes-rebooting.adoc#nodes-nodes-rebooting-gracefully_nodes-nodes-rebooting[Rebooting a node gracefully]
26
+
endif::openshift-dedicated,openshift-rosa[]
24
27
25
28
* xref:../authentication/understanding-and-creating-service-accounts.adoc#service-accounts-managing_understanding-service-accounts[Creating service accounts]
To control access to an {product-title} cluster, a cluster administrator can configure xref:../authentication/understanding-authentication.adoc#understanding-authentication[user authentication] and ensure only approved users access the cluster.
12
+
To control access to an {product-title} cluster,
13
+
ifndef::openshift-dedicated,openshift-rosa[]
14
+
a cluster administrator
15
+
endif::openshift-dedicated,openshift-rosa[]
16
+
ifdef::openshift-dedicated,openshift-rosa[]
17
+
an administrator with the `dedicated-admin` role
18
+
endif::openshift-dedicated,openshift-rosa[]
19
+
can configure xref:../authentication/understanding-authentication.adoc#understanding-authentication[user authentication] and ensure only approved users access the cluster.
13
20
14
21
To interact with an {product-title} cluster, users must first authenticate to the {product-title} API in some way. You can authenticate by providing an xref:../authentication/understanding-authentication.adoc#rbac-api-authentication_understanding-authentication[OAuth access token or an X.509 client certificate] in your requests to the {product-title} API.
15
22
16
23
[NOTE]
17
24
====
18
25
If you do not present a valid access token or certificate, your request is unauthenticated and you receive an HTTP 401 error.
19
26
====
27
+
28
+
ifdef::openshift-dedicated,openshift-rosa[]
29
+
An administrator can configure authentication by configuring an identity provider. You can define any xref:../authentication/sd-configuring-identity-providers.adoc#understanding-idp-supported_sd-configuring-identity-providers[supported identity provider in {product-title}] and add it to your cluster.
30
+
endif::openshift-dedicated,openshift-rosa[]
31
+
32
+
ifndef::openshift-dedicated,openshift-rosa[]
20
33
An administrator can configure authentication through the following tasks:
21
34
22
35
* Configuring an identity provider: You can define any xref:../authentication/understanding-identity-provider.adoc#supported-identity-providers[supported identity provider in {product-title}] and add it to your cluster.
23
-
* xref:../authentication/configuring-internal-oauth.adoc#configuring-internal-oauth[Configuring the internal OAuth server]: The {product-title} control plane includes a built-in OAuth server that determines the user’s identity from the configured identity provider and creates an access token. You can configure the token duration and inactivity timeout, and customize the internal OAuth server URL.
36
+
37
+
* xref:../authentication/configuring-internal-oauth.adoc#configuring-internal-oauth[Configuring the internal OAuth server]: The {product-title} control plane includes a built-in OAuth server that determines the user's identity from the configured identity provider and creates an access token. You can configure the token duration and inactivity timeout, and customize the internal OAuth server URL.
24
38
+
25
39
[NOTE]
26
40
====
27
41
Users can xref:../authentication/managing-oauth-access-tokens.adoc#managing-oauth-access-tokens[view and manage OAuth tokens owned by them].
28
42
====
43
+
29
44
* Registering an OAuth client: {product-title} includes several xref:../authentication/configuring-oauth-clients.adoc#oauth-default-clients_configuring-oauth-clients[default OAuth clients]. You can xref:../authentication/configuring-oauth-clients.adoc#oauth-register-additional-client_configuring-oauth-clients[register and configure additional OAuth clients].
30
45
+
31
46
[NOTE]
@@ -35,6 +50,7 @@ When users send a request for an OAuth token, they must specify either a default
35
50
36
51
* Managing cloud provider credentials using the xref:../authentication/managing_cloud_provider_credentials/about-cloud-credential-operator.adoc#about-cloud-credential-operator[Cloud Credentials Operator]: Cluster components use cloud provider credentials to get permissions required to perform cluster-related tasks.
37
52
* Impersonating a system admin user: You can grant cluster administrator permissions to a user by xref:../authentication/impersonating-system-admin.adoc#impersonating-system-admin[impersonating a system admin user].
53
+
endif::openshift-dedicated,openshift-rosa[]
38
54
39
55
[id="authorization-overview"]
40
56
== About authorization in {product-title}
@@ -49,14 +65,35 @@ Along with controlling user access to a cluster, you can also control the action
49
65
You can manage authorization for {product-title} through the following tasks:
50
66
51
67
* Viewing xref:../authentication/using-rbac.adoc#viewing-local-roles_using-rbac[local] and xref:../authentication/using-rbac.adoc#viewing-cluster-roles_using-rbac[cluster] roles and bindings.
68
+
52
69
* Creating a xref:../authentication/using-rbac.adoc#creating-local-role_using-rbac[local role] and assigning it to a user or group.
70
+
71
+
ifndef::openshift-dedicated,openshift-rosa[]
53
72
* Creating a cluster role and assigning it to a user or group: {product-title} includes a set of xref:../authentication/using-rbac.adoc#default-roles_using-rbac[default cluster roles]. You can create additional xref:../authentication/using-rbac.adoc#creating-cluster-role_using-rbac[cluster roles] and xref:../authentication/using-rbac.adoc#adding-roles_using-rbac[add them to a user or group].
73
+
endif::openshift-dedicated,openshift-rosa[]
74
+
ifdef::openshift-dedicated,openshift-rosa[]
75
+
* Assigning a cluster role to a user or group: {product-title} includes a set of xref:../authentication/using-rbac.adoc#default-roles_using-rbac[default cluster roles]. You can xref:../authentication/using-rbac.adoc#adding-roles_using-rbac[add them to a user or group].
76
+
endif::openshift-dedicated,openshift-rosa[]
77
+
78
+
ifndef::openshift-dedicated,openshift-rosa[]
54
79
* Creating a cluster-admin user: By default, your cluster has only one cluster administrator called `kubeadmin`. You can xref:../authentication/using-rbac.adoc#creating-cluster-admin_using-rbac[create another cluster administrator]. Before creating a cluster administrator, ensure that you have configured an identity provider.
55
80
+
56
81
[NOTE]
57
82
====
58
83
After creating the cluster admin user, xref:../authentication/remove-kubeadmin.adoc#removing-kubeadmin_removing-kubeadmin[delete the existing kubeadmin user] to improve cluster security.
59
84
====
85
+
endif::openshift-dedicated,openshift-rosa[]
86
+
87
+
ifdef::openshift-rosa[]
88
+
* Creating cluster-admin and dedicated-admin users: The user who created the {product-title} cluster can grant access to other xref:../authentication/using-rbac.adoc#rosa-create-cluster-admins_using-rbac[`cluster-admin`] and xref:../authentication/using-rbac.adoc#rosa-create-dedicated-cluster-admins_using-rbac[`dedicated-admin`] users.
89
+
endif::openshift-rosa[]
90
+
91
+
ifdef::openshift-dedicated[]
92
+
* Granting administrator privileges to users: You can xref:../authentication/using-rbac.adoc#osd-grant-admin-privileges_using-rbac[grant `dedicated-admin` privileges to users].
93
+
endif::openshift-dedicated[]
94
+
60
95
* Creating service accounts: xref:../authentication/understanding-and-creating-service-accounts.adoc#service-accounts-overview_understanding-service-accounts[Service accounts] provide a flexible way to control API access without sharing a regular user’s credentials. A user can xref:../authentication/understanding-and-creating-service-accounts.adoc#service-accounts-managing_understanding-service-accounts[create and use a service account in applications] and also as xref:../authentication/using-service-accounts-as-oauth-client.adoc#using-service-accounts-as-oauth-client[an OAuth client].
96
+
61
97
* xref:../authentication/tokens-scoping.adoc#tokens-scoping[Scoping tokens]: A scoped token is a token that identifies as a specific user who can perform only specific operations. You can create scoped tokens to delegate some of your permissions to another user or a service account.
98
+
62
99
* Syncing LDAP groups: You can manage user groups in one place by xref:../authentication/ldap-syncing.adoc#ldap-syncing[syncing the groups stored in an LDAP server] with the {product-title} user groups.
As an administrator with the `dedicated-admin` role,
14
+
endif::openshift-dedicated,openshift-rosa[]
12
15
you can use groups to manage users, change
13
16
their permissions, and enhance collaboration. Your organization may have already
14
17
created user groups and stored them in an LDAP server. {product-title} can sync
@@ -17,15 +20,28 @@ your groups in one place. {product-title} currently supports group sync with
17
20
LDAP servers using three common schemas for defining group membership: RFC 2307,
18
21
Active Directory, and augmented Active Directory.
19
22
23
+
ifndef::openshift-dedicated,openshift-rosa[]
20
24
For more information on configuring LDAP, see
21
25
xref:../authentication/identity_providers/configuring-ldap-identity-provider.adoc#configuring-ldap-identity-provider[Configuring an LDAP identity provider].
26
+
endif::openshift-dedicated,openshift-rosa[]
27
+
28
+
ifdef::openshift-dedicated,openshift-rosa[]
29
+
For more information on configuring LDAP, see
30
+
xref:../authentication/sd-configuring-identity-providers.adoc#config-ldap-idp_sd-configuring-identity-providers[Configuring an LDAP identity provider].
After your {product-title} cluster is created, you must configure identity providers to determine how users log in to access the cluster.
10
+
11
+
ifdef::openshift-rosa[]
12
+
The following topics describe how to configure an identity provider using {cluster-manager} console. Alternatively, you can use the ROSA CLI (`rosa`) to configure an identity provider and access the cluster.
* xref:../rosa_install_access_delete_clusters/rosa-sts-accessing-cluster.adoc#rosa-sts-accessing-cluster[Accessing a cluster]
32
+
* xref:../rosa_getting_started/rosa-sts-getting-started-workflow.adoc#rosa-sts-understanding-the-deployment-workflow[Understanding the ROSA with STS deployment workflow]
0 commit comments