Details

    • Affects:
      Documentation (Ref Guide, User Guide, etc.)

      Description

      Products affected:
      Red Hat Decision Manager (RHDM)

      In cluster environments use the same LDAP server/creds to get in.e.g:
      ==================
      apiVersion: config.openshift.io/v1
      kind: OAuth
      metadata:
      annotations:
      kubectl.kubernetes.io/last-applied-configuration: >
      {"apiVersion":"config.openshift.io/v1","kind":"OAuth","metadata":{"annotations":{},"name":"cluster"},"spec":{"identityProviders":[{"ldap":{"attributes":

      {"email":["email"],"id":["sAMAccountName"],"name":["displayName"],"preferredUsername":["sAMAccountName"]}

      ,"bindDN":"CN=svc.rhocpldapRo,OU=OpenShift,OU=ApplicationSecurity,OU=SystemManagement,DC=corp,DC=archcapservices,DC=com","bindPassword":

      {"name":"ldap-secret"}

      ,"ca":

      {"name":"ldap-ca-config-map"}

      ,"insecure":false,"url":"ldaps://aigi-pwvdc001.corp.archcapservices.com/dc=archcapservices,dc=com?sAMAccountName"},"mappingMethod":"claim","name":"ARCHCAPSERVICES","type":"LDAP"}]}}
      release.openshift.io/create-only: 'true'
      creationTimestamp: '2020-05-20T15:49:17Z'
      generation: 8
      name: cluster
      resourceVersion: '439051'
      selfLink: /apis/config.openshift.io/v1/oauths/cluster
      uid: 4457796b-73f9-4e4c-a268-ab39afc051dc
      spec:
      identityProviders:

      • ldap:
        attributes:
        email:
      • email
        id:
      • sAMAccountName
        name:
      • displayName
        preferredUsername:
      • sAMAccountName
        bindDN: >-
        CN=svc.rhocpldapRo,OU=Misc,OU=ApplicationSecurity,OU=SystemManagement,DC=corp,DC=archcapservices,DC=com
        bindPassword:
        name: ldap-secret
        ca:
        name: ldap-ca-config-map
        insecure: false
        url: >-
        ldaps://aigi-pwvdc001.corp.archcapservices.com/DC=corp,DC=archcapservices,DC=com?sAMAccountName
        mappingMethod: claim
        name: ARCHCAPSERVICES
        type: LDAP
        ============================

      Note: This feature request is to allow adding a truststore in any environment: since this is not unique to LDAP, it may be required for SSO, for an external Maven repository, for an external Git repository, etc.

        Gliffy Diagrams

          Attachments

            Activity

              People

              • Assignee:
                csherrar Clifton Sherrard
                Reporter:
                rhn-support-luzrodri Luz Rodriguez
              • Votes:
                0 Vote for this issue
                Watchers:
                4 Start watching this issue

                Dates

                • Due:
                  Created:
                  Updated: