Please setup OIDC in the group_vars/all.yml
. This document don't include step how to setup the OIDC identity provider. If you enable OIDC, you will get client-oidc.kubeconfig
located in deployer node. Please distribute this to the user if you want the user to login using OIDC. User can install and setup kube-login plugin.
If you already setup and running the bootstraping. In cases of OIDC, you only need to apply RBAC for accessing Kubernetes cluster from OIDC. For example:
cat <<EOF | kubectl apply -f -
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: oidc-kubernetes-admin
subjects:
- kind: Group
name: oidc:/kubernetes-admin
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole
name: cluster-admin
apiGroup: rbac.authorization.k8s.io
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: oidc-kubernetes-view
subjects:
- kind: Group
name: oidc:/kubernetes-viewer
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole
name: system:public-info-viewer
apiGroup: rbac.authorization.k8s.io
EOF