-
Notifications
You must be signed in to change notification settings - Fork 405
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support additional OIDC configuration with shoot-oidc-service extension #18305
Comments
Would love to test it at earliest convinience. |
This issue or PR has been automatically marked as stale due to the lack of recent activity. This bot triages issues and PRs according to the following rules:
You can:
If you think that I work incorrectly, kindly raise an issue with the problem. /lifecycle stale |
The goal would be to allow kyma users to deploy apps (and run tests ) on the provisioned kyma runtimes in the CI jobs . Execution can be divided into several stages:
|
OIDC configuration will be included in the gardener provisioning in q2 |
This issue has been automatically marked as stale due to the lack of recent activity. It will soon be closed if no further activity occurs. |
Kyma Infrastructure Manager (KIM) should apply Operator-Facing OIDC separately from User-facing OIDC(s) In order to allow this we need to adjust the interfaces:
to avoid unwanted impersonations, we should:
|
Regarding migration from existing shoots to
|
Would be great to have this available soon, as a dependency we want to use requires that and also to bring our kya into production it would be kind of a prerequisite. |
To unblock customers who are waiting for the enablement of the OIDC extension in GArdener, we updated the Provisioner last week to activate this extension per default for all new created clusters. So, any new created SKR cluster will have the OIDC extension now enabled and customers can configure their own OIDC provider by creating the corresponding CR in their SKR clusters. It is planned to start the replacement of the Provisioner with KIM (Kyma Infrasturcture Manager) by end of this month. KIM will also per default enable the OIDC extension for all managed clusters. |
it would be very helpful to have this available soon, as a dependency we want to use requires that and also to bring our kyma into production it would be kind of a prerequisite and this will help us to manage BTP Kyma Workload via Cloud Orchestrator/Crossplane without the need for manual task |
It will be super helpful if we have this capability so that we can bootstrap ArgoCD in the provisioned Kyma cluster so that ArgoCD to take over the rest of the deployments that are coming in from the service pipelines. |
That's sth which is already done via a terraform based automation module: https://github.com/quovadis-btp/btp-automation/tree/main/btp-context/runtime-context I'm trying hard to finalize a public root module which will then allow you to use the above child module. Will keep you posted. Thx |
This is great news that shoot-oidc-service extension is available in all newly created kyma clusters. What is the timeline to roll this out to already existing SAP Kyma clusters? |
Sorry for the late reply @abhijith-darshan. We were facing and fixing several unexpected challenges in the new Infrastructure Manager during the last weeks which were again causing delay in our rollout. Unfortunaltey, we were not able to migrate all productive clusters to the new Kyma Infrastructure Manager yet which is a pre-requisite for releasing the OIDC feature. We are currently finalising the testing phase of KIM and plan to migrate all productive clusters beginning of next year. Our SRE team will, after KIM was released, migrate all existing clusters to support the new OIDC configuration. @ebensom can provide more details when this migration will happen. |
This issue has been automatically marked as stale due to the lack of recent activity. It will soon be closed if no further activity occurs. |
24.01.2025 - Meeting with Benjamin about OIDC migration and release on production (exposed by KEB): Execution Plan. Repeat per DEV, STAGE and PROD 0.1 ) Backup TASK_SRE/FROGS When dev, stage, prod done then: 1 ) Gophers: AT this point KEB can expose additionalOIDC parameter for users to handle list of oidcs. TASK_GOPHERS Questions: |
Thanks for your request, here our feedback:
JFYI - @Disper ⏫ |
Please consider if we need the OIDC provider for operator access enabled all the time. Some certification programs require that customers grant operator access. Therefore we should consider having the operator OIDC provider configured on demand or at least role binding should be created on demand by the customer that wants the operator to troubleshoot the cluster. |
@ebensom / @PK85 : as @pbochynski mentioned, I fear we have to revisit our decision how we deal with operator access to clusters. Our last agreement to have always access would, at least for PCI relevant runtimes, introduce several disadvantages. the PCI auditor recommended that our ops-team should not be able to access any machines. The customers should grant us access when needed (avoids that our engineers would be able to access CHD related data). @pbochynski - do you think we should also revisit our general approach how we manage PCI relevant systems in KLM/KIM? Maybe we should for such systems disable the reconciliation and customers have to enable it actively to receive latest updates. |
Since It is anyway recommended by Any plans of allowing multiple issuers for |
Hi @abhijith-darshan , thanks for your request! We are going to support multiple OIDC providers soon. The implementation is mostly done, but we have still several migration tasks ahead and our SRE team is working on them. It's also planned to add support for multiple OIDC providers to the Kyma Dashboard. This feature will still use Gardeners OIDC extension. We move internally to structured authentication, but this is approach is at the moment not used for OIDC configurations provided by customers. |
Description
Enable the option to trust the additional identity provider compliant with OpenID. The provider can be registered in the Kyma cluster and kubernetes API server will authenticate tokens that match the provider issuer.
The complete solution should allow to establish the trust during the provisioning so the cluster can be accessed from fully automated processes (without user presence). To accomplish that the following changes are required:
shoot-oidc-service
extension for shoot clustersOpenIDConnect
resource in the shoot cluster as Kyma instance parameter (KEB)Acceptance Criteria
Reasons
Many users request a possibility to deploy software to freshly creaated Kyma clusters in automated way. Changing the default IDP for the cluster is the only solution available for now, but then IDP has to support both human users and service accounts what is usually challenging. With additional OIDC provider it can be used only for system to system authorization and will be much easier to set up.
Links
The text was updated successfully, but these errors were encountered: