You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
After you have configured your identity providers, users can access the cluster from the {OCM}.
10
+
After you have added a user to your configured identity provider, you can log in to your {product-title} cluster through the web console.
12
11
13
12
.Prerequisites
14
13
15
-
* You have created a cluster.
16
-
* Identity providers have been configured for your cluster.
14
+
* You logged in to {OCM}.
15
+
* You created an {product-title} cluster.
16
+
* You configured an identity provider for your cluster.
17
+
* You added your user account to the configured identity provider.
17
18
18
19
.Procedure
19
20
20
-
. From {console-redhat-com}, click on the cluster you want to access.
21
-
22
-
. Click *Open Console*.
23
-
24
-
. Click on your identity provider and provide your credentials to log into the cluster.
21
+
. Navigate to {console-redhat-com} and select your cluster.
25
22
26
-
.Verification
23
+
. Click *Open console* to open the web console for your cluster.
27
24
28
-
* After you have accessed the cluster, you are directed to the console for your {product-title} cluster.
25
+
. Click on your identity provider and provide your credentials to log in to the cluster. Complete any authorization requests that are presented by your provider.
Copy file name to clipboardExpand all lines: modules/ccs-aws-customer-procedure.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ The Customer Cloud Subscription (CCS) model allows Red Hat to deploy and manage
13
13
14
14
. If the customer is using AWS Organizations, you must either use an AWS account within your organization or link:https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_create.html#orgs_manage_accounts_create-new[create a new one].
15
15
16
-
. To ensure that Red Hat can perform necessary actions, you must either create a Service Control Policy (SCP) or ensure that none is applied to the AWS account.
16
+
. To ensure that Red Hat can perform necessary actions, you must either create a service control policy (SCP) or ensure that none is applied to the AWS account.
17
17
18
18
. link:https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html[Attach] the SCP to the AWS account.
Copy file name to clipboardExpand all lines: modules/ccs-aws-customer-requirements.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@
13
13
14
14
* The customer ensures that link:https://docs.aws.amazon.com/general/latest/gr/aws_service_limits.html[AWS limits] are sufficient to support {product-title} provisioned within the customer-provided AWS account.
15
15
16
-
* The customer-provided AWS account should be in the customer's AWS Organization with the applicable Service Control Policy (SCP) applied.
16
+
* The customer-provided AWS account should be in the customer's AWS Organization with the applicable service control policy (SCP) applied.
Copy file name to clipboardExpand all lines: modules/ccs-aws-scp.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,10 +3,10 @@
3
3
// * assemblies/aws-ccs.adoc
4
4
5
5
[id="ccs-aws-scp_{context}"]
6
-
= Minimum required Service Control Policy (SCP)
6
+
= Minimum required service control policy (SCP)
7
7
8
8
9
-
Service Control Policy (SCP) management is the responsibility of the customer. These policies are maintained in the AWS Organization and control what services are available within the attached AWS accounts.
9
+
Service control policy (SCP) management is the responsibility of the customer. These policies are maintained in the AWS Organization and control what services are available within the attached AWS accounts.
Copy file name to clipboardExpand all lines: modules/ccs-aws-understand.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,4 +11,4 @@ To deploy {product-title} into your existing Amazon Web Services (AWS) account u
11
11
12
12
Red Hat recommends the usage of an AWS Organization to manage multiple AWS accounts. The AWS Organization, managed by the customer, hosts multiple AWS accounts. There is a root account in the organization that all accounts will refer to in the account hierarchy.
13
13
14
-
It is recommended for the {product-title} cluster using a CCS model to be hosted in an AWS account within an AWS Organizational Unit. A Service Control Policy (SCP) is created and applied to the AWS Organizational Unit that manages what services the AWS sub-accounts are permitted to access. The SCP applies only to available permissions within a single AWS account for all AWS sub-accounts within the Organizational Unit. It is also possible to apply a SCP to a single AWS account. All other accounts in the customer’s AWS Organization are managed in whatever manner the customer requires. Red Hat Site Reliability Engineers (SRE) will not have any control over SCPs within the AWS Organization.
14
+
It is recommended for the {product-title} cluster using a CCS model to be hosted in an AWS account within an AWS Organizational Unit. A service control policy (SCP) is created and applied to the AWS Organizational Unit that manages what services the AWS sub-accounts are permitted to access. The SCP applies only to available permissions within a single AWS account for all AWS sub-accounts within the Organizational Unit. It is also possible to apply a SCP to a single AWS account. All other accounts in the customer’s AWS Organization are managed in whatever manner the customer requires. Red Hat Site Reliability Engineers (SRE) will not have any control over SCPs within the AWS Organization.
Copy file name to clipboardExpand all lines: modules/config-idp.adoc
+47-25Lines changed: 47 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,8 +6,11 @@
6
6
[id="config-idp_{context}"]
7
7
= Configuring an identity provider
8
8
9
+
After you have installed {product-title}, you must configure your cluster to use an identity provider. You can then add members to your identity provider to grant them access to your cluster.
9
10
10
-
After your {product-title} cluster is created, you must configure identity providers to determine how users log in to access the cluster. This example configures a GitHub identity provider.
11
+
You can configure different identity provider types for your {product-title} cluster. Supported types include GitHub, GitHub Enterprise, GitLab, Google, LDAP, OpenID Connect, and HTPasswd identity providers.
12
+
13
+
The following procedure configures a GitHub identity provider as an example.
11
14
12
15
[WARNING]
13
16
====
@@ -16,53 +19,72 @@ Configuring GitHub authentication allows users to log in to {product-title} with
16
19
17
20
.Prerequisites
18
21
19
-
* The OAuth application must be created directly within the GitHub link:https://docs.github.com/en/github/setting-up-and-managing-organizations-and-teams/managing-organization-settings[organization settings] by the GitHub organization administrator.
20
-
* link:https://docs.github.com/en/github/setting-up-and-managing-organizations-and-teams[GitHub organizations or teams] are set up in your GitHub account.
22
+
* You logged in to {OCM}.
23
+
* You created an {product-title} cluster.
24
+
* You have a GitHub user account.
25
+
* You created a GitHub organization in your GitHub account. For more information, see link:https://docs.github.com/en/organizations/collaborating-with-groups-in-organizations/creating-a-new-organization-from-scratch[Creating a new organization from scratch] in the GitHub documentation.
26
+
* If you are restricting user access to a GitHub team, you have created a team within your GitHub organization. For more information, see link:https://docs.github.com/en/organizations/organizing-members-into-teams/creating-a-team[Creating a team] in the GitHub documentation.
21
27
22
28
.Procedure
23
29
24
-
. Navigate to the *Clusters* page and select the cluster that you need to configure identity providers for.
30
+
. Navigate to {console-redhat-com} and select your cluster.
31
+
32
+
. Select *Access control*->*Identity providers*.
33
+
34
+
. Select the *GitHub* identity provider type from the *Add identity provider* drop-down menu.
25
35
26
-
. Click the *Access control* tab.
36
+
. Enter a unique name for the identity provider. The name cannot be changed later.
27
37
28
-
. Click *Add identity provider*.
38
+
. Register an OAuth application in your GitHub organization by following the steps in the link:https://docs.github.com/en/developers/apps/creating-an-oauth-app[GitHub documentation].
29
39
+
30
40
[NOTE]
31
41
====
32
-
You can also click the *Add Oauth configuration* link in the warning message displayed after cluster creation to configure your identity providers.
42
+
You must register the OAuth app under your GitHub organization. If you register an OAuth application that is not owned by the organization that contains your cluster users or teams, then user authentication to the cluster will not succeed.
33
43
====
34
44
35
-
. Select *GitHub* from the drop-down menu.
36
-
37
-
. Enter a unique name for the identity provider. This name cannot be changed later.
38
-
** An *OAuth callback URL* is automatically generated in the provided field. You will use this to register the GitHub application.
45
+
* For the homepage URL in your GitHub OAuth app configuration, specify the `\https://oauth-openshift.apps.<cluster_name>.<cluster_domain>` portion of the *OAuth callback URL* that is automatically generated in the *Add a GitHub identity provider* page on {OCM}.
46
+
+
47
+
The following is an example of a homepage URL for a GitHub identity provider:
* For the authorization callback URL in your GitHub OAuth app configuration, specify the full *OAuth callback URL* that is automatically generated in the *Add a GitHub identity provider* page on {OCM}. The full URL has the following syntax:
. link:https://docs.github.com/en/developers/apps/creating-an-oauth-app[Register an application on GitHub].
59
+
. Return to the *Edit identity provider: GitHub* dialog in {OCM} and select *Claim* from the *Mapping method* drop-down menu.
51
60
52
-
. Return to {product-title}and select a mapping method from the drop-down menu. *Claim* is recommended in most cases.
61
+
. Enter the *Client ID*and *Client secret* for your GitHub OAuth application. The GitHub page for your OAuth app provides the ID and secret.
53
62
54
-
. Enter the *Client ID* and *Client secret* provided by GitHub.
55
-
56
-
. Enter a *hostname*. A hostname must be entered when using a hosted instance of GitHub Enterprise.
63
+
. Optional: Enter a *hostname*.
64
+
+
65
+
[NOTE]
66
+
====
67
+
A hostname must be entered when using a hosted instance of GitHub Enterprise.
68
+
====
57
69
58
-
. Optional: You can use a certificate authority (CA) file to validate server certificates for the configured GitHub Enterprise URL. Click *Browse* to locate and attach a *CA file* to the identity provider.
70
+
. Optional: You can specify a certificate authority (CA) file to validate server certificates for a configured GitHub Enterprise URL. Click *Browse* to locate and attach a *CA file* to the identity provider.
59
71
60
-
. Select *Use organizations* or *Use teams* to restrict access to a particular GitHub organization or a GitHub team.
72
+
. Select *Use organizations* or *Use teams* to restrict access to a GitHub organization or a GitHub team within an organization.
61
73
62
-
. Enter the name of the organization or team you would like to restrict access to. Click *Add more* to specify multiple organizations or teams that users can be a member of.
74
+
. Enter the name of the organization or team you would like to restrict access to. Click *Add more* to specify multiple organizations or teams.
75
+
+
76
+
[NOTE]
77
+
====
78
+
Specified organizations must own an OAuth app that was registered by using the preceding steps. If you specify a team, it must exist within an organization that owns an OAuth app that was registered by using the preceding steps.
79
+
====
63
80
64
-
. Click *Confirm*.
81
+
. Click *Add* to apply the identity provider configuration.
82
+
+
83
+
[NOTE]
84
+
====
85
+
It might take approximately two minutes for the identity provider configuration to become active.
86
+
====
65
87
66
88
.Verification
67
89
68
-
* The configured identity provider is now visible on the *Access control*tab of the *Clusters* page.
90
+
* After the configuration becomes active, the identity provider is listed under *Access control*->*Identity providers* on the {OCM} page for your cluster.
0 commit comments