-
Notifications
You must be signed in to change notification settings - Fork 792
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Provide options to use IBM Cloud AppID as authentication provider #2182
Comments
Issue-Label Bot is automatically applying the labels:
Please mark this comment with 👍 or 👎 to give our bot feedback! |
RequirementIn order to bring in IBM Cloud AppID as a replacement of Dex, it will need to work with existing component called oidc-authservice of multi-user Kubeflow from https://github.com/arrikto/oidc-authservice it's technically working now with its previous release, but more work required ONLY if we want to integrate with latest release of arrikto/oidc-authservice. Option 1upgrade arrikto/oidc-authservice to latest
Option 2Keep using existing out-dated arrikto/oidc-authservice container image.
@animeshsingh @adrian555 @Tomcli comments? |
UpdatesI've got the AppID works in Kubeflow 1.1 deployed on OpenShift. see my code changes here:
Once I get some code merged, I can start working on doc. Notice that I've used the option 2 from ☝️ with tweaked settings like: env:
- name: USERID_HEADER
value: kubeflow-userid
- name: USERID_PREFIX
- name: USERID_CLAIM
value: email
- name: OIDC_PROVIDER
value: >-
https://<appid-tenant-url>
- name: OIDC_AUTH_URL
- name: OIDC_SCOPES
value: email
- name: REDIRECT_URL
value: >-
https://<istio-ingressgateway-public-endpoint-FQDN>/login/oidc
- name: SKIP_AUTH_URI
- name: PORT
value: '8080'
- name: CLIENT_ID
value: <client_id_from_AppID_service-credential>
- name: CLIENT_SECRET
value: <client_secret_from_AppID_service-credential> |
Progress@adrian555 and I had a quick chat on the initial design:
|
just one comment, @shawnzhu will provide the install instructions with appid on IBM Cloud native K8S cluster first and document through this issue. |
+1 |
This is a follow up of #2069 and #2000
Today
It uses dex as OIDC auth provider.
Expected outcome
It provides configuration path to use IBM Cloud AppID as OIDC auth provider besides dex.
The text was updated successfully, but these errors were encountered: