@@ -155,22 +155,58 @@ openshift_master_identity_providers=[{'name': 'htpasswd_auth', 'login': 'true',
155
155
#openshift_master_identity_providers=[{'name': 'allow_all', 'login': 'true', 'challenge': 'true', 'kind': 'AllowAllPasswordIdentityProvider'}]
156
156
157
157
# LDAP auth
158
- #openshift_master_identity_providers=[{'name': 'my_ldap_provider', 'challenge': 'true', 'login': 'true', 'kind': 'LDAPPasswordIdentityProvider', 'attributes': {'id': ['dn'], 'email': ['mail'], 'name': ['cn'], 'preferredUsername': ['uid']}, 'bindDN': '', 'bindPassword': '', 'ca': '', ' insecure': 'false', 'url': 'ldap://ldap.example.com:389/ou=users,dc=example,dc=com?uid'}]
158
+ #openshift_master_identity_providers=[{'name': 'my_ldap_provider', 'challenge': 'true', 'login': 'true', 'kind': 'LDAPPasswordIdentityProvider', 'attributes': {'id': ['dn'], 'email': ['mail'], 'name': ['cn'], 'preferredUsername': ['uid']}, 'bindDN': '', 'bindPassword': '', 'insecure': 'false', 'url': 'ldap://ldap.example.com:389/ou=users,dc=example,dc=com?uid'}]
159
159
# Configuring the ldap ca certificate <1>
160
160
#openshift_master_ldap_ca=<ca text>
161
161
# or
162
- #openshift_master_ldap_ca_file=<path to local ca file to use>
162
+ #openshift_master_ldap_ca_file=<path to local ca file to use> <2>
163
163
164
- # Available variables for configuring certificates for other identity providers:
164
+ # Available variables for configuring certificates for other identity providers: <3>
165
165
#openshift_master_openid_ca
166
- #openshift_master_openid_ca_file
166
+ #openshift_master_openid_ca_file <2>
167
167
#openshift_master_request_header_ca
168
- #openshift_master_request_header_ca_file
169
- ----
170
- <1> If you specify your CA certificate location in the
171
- `openshift_master_identity_providers` parameter, do not specify a certificate
172
- value in the `openshift_master_ldap_ca` parameter or path in the
173
- `openshift_master_ldap_ca_file` parameter.
168
+ #openshift_master_request_header_ca_file <2>
169
+ ----
170
+ <1> If you specified `'insecure': 'false'`
171
+ in the `openshift_master_identity_providers` parameter for only an LDAP identity
172
+ provider, you can omit the CA certificate.
173
+ <2> If you specify a file on the host you run the playbook on, its contents are
174
+ copied to the
175
+ *_/etc/origin/master/<identity_provider_name>_<identity_provider_type>_ca.crt_*
176
+ file. The
177
+ identity provider name is the value of the `openshift_master_identity_providers`
178
+ parameter, `ldap`, `openid`, or `request_header`. If you do not
179
+ specify the CA text or the path to the local CA file, you must place the CA
180
+ certificate in this location. If you specify multiple identity providers, you
181
+ must manually place the CA certificate for each provider in this location. You cannot change this location.
182
+
183
+ You can specify multiple identity providers. If you do, you must place the
184
+ CA certificate for each identity provider in the *_/etc/origin/master/_* directory.
185
+ For example, you include the following providers in your
186
+ `openshift_master_identity_providers` value:
187
+
188
+ ----
189
+ openshift_master_identity_providers:
190
+ - name: foo
191
+ provider:
192
+ kind: OpenIDIdentityProvider
193
+ ...
194
+ - name: bar
195
+ provider:
196
+ kind: OpenIDIdentityProvider
197
+ ...
198
+ - name: baz
199
+ provider:
200
+ kind: RequestHeaderIdentityProvider
201
+ ...
202
+ ----
203
+
204
+ You must place the CA certificates for these identity providers in the following
205
+ files:
206
+
207
+ * *_/etc/origin/master/foo_openid_ca.crt_*
208
+ * *_/etc/origin/master/bar_openid_ca.crt_*
209
+ * *_/etc/origin/master/baz_requestheader_ca.crt_*
174
210
175
211
[[identity_providers_master_config]]
176
212
@@ -198,9 +234,6 @@ oauthConfig:
198
234
When set to the default `claim` value, OAuth will fail if the identity is
199
235
mapped to a previously-existing user name.
200
236
201
- [[identity_providers_methods]]
202
- === Configuring an identity provider or method
203
-
204
237
[[LookupMappingMethod]]
205
238
==== Manually provisioning a user when using the lookup mapping method
206
239
0 commit comments