-
Feature
-
Resolution: Unresolved
-
Major
-
None
-
None
-
Product / Portfolio Work
-
None
-
- Color Status: Green
- Status Summary:
- 4.21 API pr has merged. Test rates are green for promotion in 4.20, just waiting on z-stream window to merge
- Risks:
- n/a
-
False
-
-
False
-
None
-
None
-
None
-
None
-
-
None
-
None
-
None
-
None
Feature Overview (aka. Goal Summary)
Some of the fields in the AuthenticationConfig CRD, such as uid and extras, that were added in upstream Kubernetes are missing from the OpenShift version of the CRD. We have a customer that would like to make use of that functionality, but the API needs to be updated to enable them to do it.
Goals (aka. expected user outcomes)
Expose and enable the missing fields and test to ensure that they work as expected.
Requirements (aka. Acceptance Criteria):
A list of specific needs or objectives that a feature must deliver in order to be considered complete. Be sure to include nonfunctional requirements such as security, reliability, performance, maintainability, scalability, usability, etc. Initial completion during Refinement status.
<enter general Feature acceptance here>
Anyone reviewing this Feature needs to know which deployment configurations that the Feature will apply to (or not) once it's been completed. Describe specific needs (or indicate N/A) for each of the following deployment scenarios. For specific configurations that are out-of-scope for a given release, ensure you provide the OCPSTRAT (for the future to be supported configuration) as well.
Deployment considerations | List applicable specific needs (N/A = not applicable) |
Self-managed, managed, or both | Y |
Classic (standalone cluster) | Y |
Hosted control planes | Y |
Multi node, Compact (three node), or Single node (SNO), or all | |
Connected / Restricted Network | |
Architectures, e.g. x86_x64, ARM (aarch64), IBM Power (ppc64le), and IBM Z (s390x) | |
Operator compatibility | |
Backport needed (list applicable versions) | |
UI need (e.g. OpenShift Console, dynamic plugin, OCM) | |
Other (please specify) |
Use Cases (Optional):
Include use case diagrams, main success scenarios, alternative flow scenarios. Initial completion during Refinement status.
<your text here>
Questions to Answer (Optional):
Include a list of refinement / architectural questions that may need to be answered before coding can begin. Initial completion during Refinement status.
<your text here>
Out of Scope
High-level list of items that are out of scope. Initial completion during Refinement status.
This feature is still TP, GA scope will be:
e2e testing of these fields with Keycloak, Azure AD/EntraID, as well as basic Structured Auth with BYO OIDC in GA for all form factors.
Background
Provide any additional context is needed to frame the feature. Initial completion during Refinement status.
<your text here>
Customer Considerations
Provide any additional customer-specific considerations that must be made when designing and delivering the Feature. Initial completion during Refinement status.
<your text here>
Documentation Considerations
Provide information that needs to be considered and planned so that documentation will meet customer needs. If the feature extends existing functionality, provide a link to its current documentation. Initial completion during Refinement status.
<your text here>
Interoperability Considerations
Which other projects, including ROSA/OSD/ARO, and versions in our portfolio does this feature impact? What interoperability test scenarios should be factored by the layered products? Initial completion during Refinement status.
<your text here>
- is blocked by
-
OCPSTRAT-306 [TP] Support for bring your own external OIDC based Auth provider for direct API Server access [Standalone OCP]
-
- Closed
-
- is cloned by
-
OCPSTRAT-1960 Enable All Structured Authentication Configs for Standalone and HCP (GA)
-
- In Progress
-
- is depended on by
-
RFE-6943 Support for Specifying Additional Scopes for OpenShift Console with External Authentication
-
- Approved
-
- is duplicated by
-
OCPSTRAT-1804 Bring Your Own External OIDC based Auth provider for direct API Server access [Standalone OCP GA]
-
- In Progress
-
- relates to
-
RFE-6943 Support for Specifying Additional Scopes for OpenShift Console with External Authentication
-
- Approved
-
- links to