-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Auth in Kubernetes by OIDC #148
Comments
Keycloak is an identity and a token issuer for Oauth2 tokens. Keycloak also provides fine-grained authorization services. This helps to manage permissions for all services from the Keycloak admin console and gives the power to define exactly the policies needed. Helm chart bootstraps a Keycloak StatefulSet on a Kubernetes cluster using the Helm package manager. We can use terraform module keycloak_realm Resource to deploy keycloak to EKS. |
Why not? This is a great thing that I once worked with. It would be great if you can implement a keycloack module that can interact with oidc Kubernetes, Cognito, and all ingress (you just need to describe a set of annotations and automate the deployment process) |
data "aws_eks_cluster" "this" { data "aws_region" "current" {} resource "kubernetes_namespace" "this" { resource "helm_release" "keyclok" {
} resource "local_file" "this" { locals { repository = "https://charts.bitnami.com/bitnami"
) application = { |
Please use https://github.com/provectus/sak-incubator to suggest a new module. Fork sak-incubator, add a new module with README and example how we can add this module to the main project and open pull-request from fork to sak-incubator repository. |
Done. |
Module PR still on review. |
It is necessary to create conditions for the possibility of authorization and generation of the EKS configuration file using OAUTH authorization (dex, keycloak, etc). Provide the ability to restrict users based on the RBAC model and select the OIDC authorization provider
The text was updated successfully, but these errors were encountered: