-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automatically configure an OIDC provider on major public clouds (AWS, Azure, GCP) #21176
Comments
Could you please support custom OIDC provider configuration as well? We deployed Eclipse Che over 1 year ago now, when Keycloack was the authentication provider being used. We chose to deploy an external instance of Keycloack that we manage ourselves and we have tied it to other components of our platform as well. Since the Eclipse Che Helm charts have been deprecated, we are migrating to managing our installation using the che-operator instead. The che-operator deploys a hardcoded oauth2-proxy configuration which does not work with Keycloak. Due to the plethora of authentication providers out there, my feeling is that a custom oauth2-proxy configuration is more appropriate rather than making assumptions as to what users may have and or want to use. |
@cristian-radu custom OIDC providers, including Keycloak, should be supported. Can you please help us with more details about what are the problems with current OAuth2 proxy configuration? How could we make it work with Keycloak? |
@l0rd My issue was around the fact that the oauth2-proxy checks for the presence of the However, I still think it is valuable to users to be able to change the configuration of the oauth2-proxy. Maybe the operator can just deploy a working default config and have some mechanism by which it will ignore config changes made by the user. That to me sounds like a good middle-ground as opposed to enforcing a hardcoded config. For example, I'm not too happy about having |
Issues go stale after Mark the issue as fresh with If this issue is safe to close now please do so. Moderators: Add |
Issues go stale after Mark the issue as fresh with If this issue is safe to close now please do so. Moderators: Add |
/remove-lifecycle stale |
Closed in favor of #22392 |
Is your enhancement related to a problem? Please describe
Previous to Che v7.42, Che deployment included Keyloak on any platform.
With v7.42 we switched to use Kubernetes for authorization (a Che user is a Kubernetes user) but users have to manually configure their Kubernetes cluster to use an OIDC provider (except for minikube and OpenShift).
Describe the solution you'd like
We should support an automatic OIDC provider setup for a Kubernetes cluster deployed on the 3 major cloud vendors:
Describe alternatives you've considered
No response
Additional context
When a git service is setup the OIDC provider should be configured to use the git service as an identity provider (c.f. #20583)
The text was updated successfully, but these errors were encountered: