-
Epic
-
Resolution: Unresolved
-
Critical
-
None
-
None
-
None
-
Direct External OIDC Provider for Standalone OCP
-
BU Product Work
-
False
-
None
-
False
-
Not Selected
-
In Progress
-
OCPSTRAT-306 - Support for bring your own external OIDC based Auth provider for direct API Server access [Standalone OCP][TechPreview]
-
OCPSTRAT-306Support for bring your own external OIDC based Auth provider for direct API Server access [Standalone OCP][TechPreview]
-
13% To Do, 44% In Progress, 44% Done
-
Auth - Sprint 250
Epic Goal
The ability to provide a direct authentication workflow such that OpenShift can consume bearer tokens issued by external OIDC identity providers, replacing the built-in OAuth stack by deactivating/removing its components as necessary.
Why is this important? (mandatory)
OpenShift has its own built-in OAuth server which can be used to obtain OAuth access tokens for authentication to the API. The server can be configured with an external identity provider (including support for OIDC), however it is still the built-in server that issues tokens, and thus authentication is limited to the capabilities of the oauth-server.
Scenarios (mandatory)
- As a customer, I want to integrate my OIDC Identity Provider directly with OpenShift so that I can fully use its capabilities in machine-to-machine workflows.
*As a customer in a hybrid cloud environment, I want to seamlessly use my OIDC Identity Provider across all of my fleet.
Dependencies (internal and external) (mandatory)
- Support in the console/console-operator (already completed)
- Support in the OpenShift CLI `oc` (already completed)
Contributing Teams(and contacts) (mandatory)
- Development - OCP Auth
- Documentation - OCP Auth
- QE - OCP Auth
- PX -
- Others -
Acceptance Criteria (optional)
- external OIDC provider can be configured to be used directly via the kube-apiserver to issue tokens
- built-in oauth stack no longer operational in the cluster; respective APIs, resources and components deactivated
- changing back to the built-in oauth stack possible
Drawbacks or Risk (optional)
- Enabling an external OIDC provider to an OCP cluster will result in the oauth-apiserver being removed from the system; this inherently means that the two API Services it is serving (v1.oauth.openshift.io, v1.user.openshift.io) will be gone from the cluster, and therefore any related data will be lost. It is the user's responsibility to create backups of any required data.
- Configuring an external OIDC identity provider for authentication by definition means that any security updates or patches must be managed independently from the cluster itself, i.e. cluster updates will not resolve security issues relevant to the provider itself; the provider will have to be updated separately. Additionally, new functionality or features on the provider's side might need integration work in OpenShift (depending on their nature).
Done - Checklist (mandatory)
- CI Testing - Basic e2e automationTests are merged and completing successfully
- Documentation - Content development is complete.
- QE - Test scenarios are written and executed successfully.
- Technical Enablement - Slides are complete (if requested by PLM)
- Engineering Stories Merged
- All associated work items with the Epic are closed
- Epic status should be “Release Pending”
- links to