-
Notifications
You must be signed in to change notification settings - Fork 323
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[EKS] [request]: EKS authentication rolearn wildcard support aka improved support for AWS Identity Center SSO #474
Comments
I'd be happy to try implementing this, but im not sure if the code for this is open sourced. If it is, maybe I could be pointed to it? |
Ey guys, i need too this one feature. |
I think with AWS SSO Roles this is sorta more required, as the AWS SSO roles appear to have randomly generated characters at the end of the role ARN which makes granting access to AWS SSO Roles painful. |
Anyone found a workaround for this with AWS SSO? |
This would be really helpful - any way the community can contribute? |
to clarify - path support would be really helpful for user defined roles... there is a workaround for SSO @nxtof and @sidewinder12s -
The issue is that paths aren't supported in the arn for roles - so really you get internal wildcards for free kinda? it's the leaf role name that you list after there's also a side note in the docs that's kind of a little about this: https://docs.aws.amazon.com/eks/latest/userguide/troubleshooting_iam.html#security-iam-troubleshoot-ConfigMap doesn't really mention SSO but i've verified it working as specified above. |
After a few tests, I can confirm that Nevertheless, wildcard support would definitely be useful |
Any update on this? |
Have a similar requirement to implement and wildcard support would make things easy. I wish this to be available soon. |
+1 we can't integrate with AWS SSO |
In fact you can, but not smoothly, by declaring the IAM role (without the sso path) : #474 (comment) |
The nClouds team suggested to map aws sso role directly and there is catch we need to remove /aws.sso/ like string from sso role arn that way it will work. |
+1 for wildcard support |
4 similar comments
+1 for wildcard support |
+1 for wildcard support |
+1 for wildcard support |
+1 for wildcard support |
+1 for wildcard support |
@underrun - To elaborate a bit on your point, if your SSO workflow is to allow access for a single AWS account, you are complete correct. And in fact, you can even programmatically access the SSO role through terraform with the following code:
And in your Terraform output:
That will give you an output value for However, if you are using SSO from a central account, where the user then assumes a role in an associated account, then this breaks down. That is because the That last part is brutal for our workflow - we cannot figure out a way to programmatically figure out those assume role ARNs, which is why wildcard support would be incredible for us. That's a very long-winded way of saying "+1 for this ticket", but I hope that the Terraform code is of value to someone. |
Same here. The dynamically generated role names are annoying. |
@tachang - I should actually amend my commentl; in my case my Terraform code was wrong, and I was using the SSO role from the parent organization account instead of for the account that the user was "assuming" into. So I was actually able to solve my particular use case dynamically. I still think that the functionality described in this thread has utility though! |
+1 for this feature, which will make it useful for kubectl access with aws sso creds. |
+1 aws sso with kubectl would be so much easier |
This would be super useful feature especially where there are multiple EKS Clusters and AWS Accounts relying on AWS SSO for authenticating users into the Cluster. |
Any development in this issue? The ability to some sort of a wildcard for allowing role access to EKS would be extremely useful for companies relying exclusively in AWS SSO for managing clusters (it has become a management nightmare to keep up with SSO and IAM). |
We are currently in the design phase for a AWS native integration solution between EKS and AWS Identity Center (Formerly named AWS SSO). Any feedback or requests can be posted here. |
this issue would still apply to workloads that need automated access to the kubernetes API and that don't use SSO. this is a common pattern and would also be made easier if we could use wildcards for mapping IAM roles to kubernetes groups. or will the solution being designed for integrating EKS and AWS Identity Center take into account giving access to EKS clusters to automated services via IAM roles? |
No, this would be Identity Center specific. Can you expand on your use case? |
We automate deploying our software programmatically. Humans don't log into
kubernetes (normally) to deploy workloads to kubernetes, instead remote
processes use the kubernetes api to create and manage resources in eks.
We have multiple accounts and multiple services that could be used to
manage workloads in kubernetes clusters. Currently the aws auth config map
requires mapping each role that should have access by arn, but it would be
nice to have more flexibility such that we could map a set of roles to a
kubernetes user/group without having to enumerate each role.
There are workarounds, but they involve creating and managing assume role
policies that essentially equate to kubernetes groups in iam rather than
managing permissions closer to the resource via the config map.
|
@jku8 Is there any issue/PR or something else that would allow to track the progress of mentioned feature? |
@dm3ch this is the correct issue to track |
@jku8 Please don't rename this issue as it is not what the community has been asking for. It only solves half of the problem |
Any updates on this one? It's getting ridiculous that we still can't use wildard |
It's sad that there's been no update to this feature as it's really needed. 😥 |
Added some more context here #185 (comment) |
Thanks @mikestef9 ! |
+1 |
Hey! We have our EKS clusters spread across multiple AWS accounts and those random suffixes in AWS SSO roles are really painful for us. To overcome this, i have implemented https://github.com/justinas-b/aws-iam-authenticator-sso-wrapper utility until permissionSet names or wildcards will be supported natively. If anyone would like to test and provide a feedback, i would really appreciate it. This tool basically monitors
It translates that configMap to regular format and updates
|
any update on wildcard support? |
It looks like this will get looked at next now that the IAM changes have been implemented in the EKS API. See the bottom of this comment: #185 (comment) |
quoting from #185 Being able to link permission sets to clusters will solve current big issue of role suffix random string in multi account
|
Hey @mikestef9 any progress on allowing wildcards in the principal arn of an access entry? |
We need this too ! Wildcard support or anything to easily attach an SSO Generated role to Kubernetes without having to managed k8s rbac every time someone new logs in. +1 |
Tell us about your request
Support basic glob wildcard rolearn matching for aws-auth configmap that controls iam role eks auth.
Which service(s) is this request for?
EKS
Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
Trying to avoid hardcoding lots of IAM role arns into the aws-auth configmap. It would be useful if basic glob wildcard matching worked in the
rolearn
field of each role mapping:Are you currently working around this issue?
Individually specifying each rolearn and updating the configmap everytime these roles change:
Additional context
I tried using a
*
on a workingrolearn
field and the role became unable to authenticate with the api server. EKS version (Im not sure what component handles this auth delegation, so I dont know of another relevant version to check for that):The text was updated successfully, but these errors were encountered: