-
Epic
-
Resolution: Unresolved
-
Major
-
None
-
None
-
None
-
Unified Console needs API driven authentication and access control to managed clusters
-
False
-
None
-
False
-
To Do
Epic Goal
- Unified Console needs API driven authentication and access control to managed clusters
Why is this important?
- Seamless login across the managed OpenShift clusters
Scenarios
- Cluster proxy service slack thread
- NOTE: IDP config is limited to only the ‘user’ auth path
- Today in Tech Preview: Get the token from cluster to manage APIs on the spokes
- Oauth from each spoke is used with public API server
- console backend proxies all the request headers for the cluster name
- Dance / handshake to get token for each cluster get stored to cookies in browser
BLOCKER: Using ManagedClusterAction is a permission escalation to the console operator SA
Acceptance Criteria
- CI - MUST be running successfully with tests automated
- Release Technical Enablement - Provide necessary release enablement details and documents.
- ...
Dependencies (internal and external)
- ...
Previous Work (Optional):
- …
Open questions:
- Can Token Review webhook be used? https://kubernetes.io/docs/reference/access-authn-authz/authentication/#webhook-token-authentication
Done Checklist
- CI - CI is running, tests are automated and merged.
- Release Enablement <link to Feature Enablement Presentation>
- DEV - Upstream code and tests merged: <link to meaningful PR or GitHub Issue>
- DEV - Upstream documentation merged: <link to meaningful PR or GitHub Issue>
- DEV - Downstream build attached to advisory: <link to errata>
- QE - Test plans in Polarion: <link or reference to Polarion>
- QE - Automated tests merged: <link or reference to automated tests>
- DOC - Downstream documentation merged: <link to meaningful PR>
- is related to
-
ACM-1299 Support id token from external provider to access apiserver from proxy
- Closed