Bookmark this page

Summary

  • OpenShift expands the Kubernetes authentication mechanisms by providing a built-in OAuth server to configure external identity providers (IdPs).

  • You can authenticate to OpenShift by using client certificates and OAuth access tokens.

  • OpenShift includes users, groups, and identities.

  • The mapping methods in OpenShift control how OpenShift establishes mappings between the identities of IdPs and the user resources.

  • In the OpenShift built-in OAuth server, you can configure different IdPs, such as LDAP and OIDC.

  • When you configure an LDAP IdP, OpenShift automatically synchronizes the users, but not the groups. Synchronizing LDAP groups requires manual action by an administrator and custom automation.

  • Use OIDC to automatically synchronize users and groups from an OIDC IdP, such as Google, Microsoft Identity Platform, or Keycloak.

  • OIDC claims enable OpenShift to read the user information from the OIDC token and to populate the user, identity, and group resources.

  • OpenShift provides by default the kubeadmin user, which is a special system-level user account with administrative access.

  • Use service accounts and client certificates to authenticate external resources to the Kubernetes API.

Revision: do380-4.14-397a507