Uploaded image for project: 'OpenShift Request For Enhancement'
  1. OpenShift Request For Enhancement
  2. RFE-7165

[RFE] OCM generate temporary cluster access-token | OSD cluster environment

    • Icon: Feature Request Feature Request
    • Resolution: Unresolved
    • Icon: Normal Normal
    • None
    • openshift-4.17
    • API, Auth
    • None

      1. Proposed title of this feature request: [RFE] OCM generate temporary cluster access-token | OSD cluster environment

      2. What is the nature and description of the request?

      Cx mentions:

      ~~~
      We would like to know if it's possible through OCM API / OCM CLI to generate an OpenShift Dedicated Cluster service-account & token to permit access to the API when internal OAuth of the cluster is not working or there is a problem with current identity provider.
      ~~~

      3. Why does the customer need this? (List the business requirements here)

      ~~~
      Use Case:

      • Install OSD Private Cluster 4.17 in Google Cloud Project
      • Create additional Client PSC for accessing the API (for OSD Private Cluster) or access the cluster API when ingress is set to private (for OSD Public Cluster & Private Ingress )
      • OCM cli generate temporary token for service-account with cluster-admin rights
      • Access the cluster using oc login --token='sha256~xxxxxxx' https://api.cluster:6443

      Details:

      Target implementation is for an internal OSD in-cluster service-account and token and it does not have link with OCM Offline Token nor ServiceAccount used for accessing GCP project (osd-ccs-admin)
      ~~~

      This is requested form cx after observations:

      ~~~
      We have the cluster installed and *we don't have an issue on creating the PSC to reach the cluster's API endpoints, it's more related to the capability to generate using OCM, a cluster-token to allow interaction with the API **without* a need to reach ingress-controller (authentication layer)
      ~~~

      ~~~
      As per case 04018850 - customer had an issue with the initial oc login
      They wouldn't have faced the issue if there was a possibility to directly create an admin service account

      oc login - goes to the master then returns through oauth / LB (different path which complicates routing etc..)
      Was there a service account then it has a token no need to path through oauth
      ~~~

      Let us know your thoughts on this

      Thanks in advance

              racedoro@redhat.com Ramon Acedo
              rhn-support-uwagh Utkarsh Wagh
              Votes:
              0 Vote for this issue
              Watchers:
              Start watching this issue

                Created:
                Updated: