Skip to content

Commit 459b0ad

Browse files
authored
Merge pull request openshift#12998 from kalexand-rh/BZ1633137
bug 1633137 request header changes
2 parents 0cb56ad + 77f7d16 commit 459b0ad

File tree

2 files changed

+47
-14
lines changed

2 files changed

+47
-14
lines changed

install/configuring_inventory_file.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ xref:../install_config/configuring_authentication.adoc#install-config-configurin
163163
The default value is
164164
xref:../install_config/configuring_authentication.adoc#DenyAllPasswordIdentityProvider[Deny
165165
All]. If you use a supported identity provider, configure {product-title} to
166-
use it.
166+
use it. You can configure multiple identity providers.
167167

168168
|`openshift_master_named_certificates`
169169
.2+.^|These variables are used to configure xref:../install_config/certificate_customization.adoc#install-config-certificate-customization[custom certificates] which are deployed as part of the installation. See xref:advanced-install-custom-certificates[Configuring Custom Certificates] for more information.

install_config/configuring_authentication.adoc

Lines changed: 46 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -155,22 +155,58 @@ openshift_master_identity_providers=[{'name': 'htpasswd_auth', 'login': 'true',
155155
#openshift_master_identity_providers=[{'name': 'allow_all', 'login': 'true', 'challenge': 'true', 'kind': 'AllowAllPasswordIdentityProvider'}]
156156
157157
# LDAP auth
158-
#openshift_master_identity_providers=[{'name': 'my_ldap_provider', 'challenge': 'true', 'login': 'true', 'kind': 'LDAPPasswordIdentityProvider', 'attributes': {'id': ['dn'], 'email': ['mail'], 'name': ['cn'], 'preferredUsername': ['uid']}, 'bindDN': '', 'bindPassword': '', 'ca': '', 'insecure': 'false', 'url': 'ldap://ldap.example.com:389/ou=users,dc=example,dc=com?uid'}]
158+
#openshift_master_identity_providers=[{'name': 'my_ldap_provider', 'challenge': 'true', 'login': 'true', 'kind': 'LDAPPasswordIdentityProvider', 'attributes': {'id': ['dn'], 'email': ['mail'], 'name': ['cn'], 'preferredUsername': ['uid']}, 'bindDN': '', 'bindPassword': '', 'insecure': 'false', 'url': 'ldap://ldap.example.com:389/ou=users,dc=example,dc=com?uid'}]
159159
# Configuring the ldap ca certificate <1>
160160
#openshift_master_ldap_ca=<ca text>
161161
# or
162-
#openshift_master_ldap_ca_file=<path to local ca file to use>
162+
#openshift_master_ldap_ca_file=<path to local ca file to use> <2>
163163
164-
# Available variables for configuring certificates for other identity providers:
164+
# Available variables for configuring certificates for other identity providers: <3>
165165
#openshift_master_openid_ca
166-
#openshift_master_openid_ca_file
166+
#openshift_master_openid_ca_file <2>
167167
#openshift_master_request_header_ca
168-
#openshift_master_request_header_ca_file
169-
----
170-
<1> If you specify your CA certificate location in the
171-
`openshift_master_identity_providers` parameter, do not specify a certificate
172-
value in the `openshift_master_ldap_ca` parameter or path in the
173-
`openshift_master_ldap_ca_file` parameter.
168+
#openshift_master_request_header_ca_file <2>
169+
----
170+
<1> If you specified `'insecure': 'false'`
171+
in the `openshift_master_identity_providers` parameter for only an LDAP identity
172+
provider, you can omit the CA certificate.
173+
<2> If you specify a file on the host you run the playbook on, its contents are
174+
copied to the
175+
*_/etc/origin/master/<identity_provider_name>_<identity_provider_type>_ca.crt_*
176+
file. The
177+
identity provider name is the value of the `openshift_master_identity_providers`
178+
parameter, `ldap`, `openid`, or `request_header`. If you do not
179+
specify the CA text or the path to the local CA file, you must place the CA
180+
certificate in this location. If you specify multiple identity providers, you
181+
must manually place the CA certificate for each provider in this location. You cannot change this location.
182+
183+
You can specify multiple identity providers. If you do, you must place the
184+
CA certificate for each identity provider in the *_/etc/origin/master/_* directory.
185+
For example, you include the following providers in your
186+
`openshift_master_identity_providers` value:
187+
188+
----
189+
openshift_master_identity_providers:
190+
- name: foo
191+
provider:
192+
kind: OpenIDIdentityProvider
193+
...
194+
- name: bar
195+
provider:
196+
kind: OpenIDIdentityProvider
197+
...
198+
- name: baz
199+
provider:
200+
kind: RequestHeaderIdentityProvider
201+
...
202+
----
203+
204+
You must place the CA certificates for these identity providers in the following
205+
files:
206+
207+
* *_/etc/origin/master/foo_openid_ca.crt_*
208+
* *_/etc/origin/master/bar_openid_ca.crt_*
209+
* *_/etc/origin/master/baz_requestheader_ca.crt_*
174210

175211
[[identity_providers_master_config]]
176212

@@ -198,9 +234,6 @@ oauthConfig:
198234
When set to the default `claim` value, OAuth will fail if the identity is
199235
mapped to a previously-existing user name.
200236

201-
[[identity_providers_methods]]
202-
=== Configuring an identity provider or method
203-
204237
[[LookupMappingMethod]]
205238
==== Manually provisioning a user when using the lookup mapping method
206239

0 commit comments

Comments
 (0)