A newly installed OpenShift cluster provides two authentication methods that grant administrative access: the kubeconfig file and the kubeadmin virtual user.
The HTPasswd identity provider authenticates users against credentials that are stored in a secret. The secret name and other settings for the identity provider are stored inside the OAuth custom resource.
To manage user credentials by using the HTPasswd identity provider, you must extract data from the secret, change that data using the htpasswd command, and then apply the data back to the secret.
Creating OpenShift users requires valid credentials, which an identity provider manages, plus user and identity resources.
Deleting OpenShift users requires deleting their credentials from the identity provider, and also deleting their user and identity resources.
OpenShift uses role-based access control (RBAC) to manage user actions. A role is a collection of rules that govern interaction with OpenShift resources. Default roles exist for cluster administrators, developers, and auditors.
To control user interaction, assign a user to one or more roles. A role binding contains all of the role's associations to users and groups.
To grant a user cluster administrator privileges, assign the cluster-admin role to that user.
Click CREATE to build all of the virtual machines needed for the classroom lab environment. This may take several minutes to complete. Once created the environment can then be stopped and restarted to pause your experience.
If you DELETE your lab, you will remove all of the virtual machines in your classroom and lose all of your progress.