如何接入LDAP&OIDC
接入LDAP、OIDC有两种方式;
- 在集群安装时,配置OIDC认证信息,关于OIDC配置信息,请参考Configuring the API Server。
集群安装完成后,可以通过调用API的形式切换认证模式为OIDC或LDAP
a. 修改auth配置文件,configmap: tke-auth-api,指定默认idp类型为ldap:
"auth": {
"init_tenant_type": "ldap", // 指定ldap类型的idp
"init_tenant_id": "ldap-test", // tenant id
"init_idp_administrators": ["jane"], //idp的管理员列表,需要存在客户ldap系统中,具有平台的超级管理员权限
"ldap_config_file":"_debug/auth-ldap.json",
}
b. 准备ldap配置文件,配置说明参见:dex-ldap
{
//ldap地址,host:port
"host": "localhost:389",
"insecureNoSSL": true, // 是否开始SSL,如果host没有指定端口,ture,端口为389和false, 端口为636
"bindDN": "cn=admin,dc=example,dc=org", //服务账户的DN和密码,用来查询ldap用户组和用户
"bindPW": "admin", //密码
"usernamePrompt": "User Name", //
"userSearch": {
"baseDN": "ou=People,dc=example,dc=org", //用户baseDN
"filter": "(objectClass=person)", //查询过滤条件
"username": "cn", // username的属性key,cn=jane,ou=People,dc=example,dc=org
"idAttr": "DN", // user id的属性key
"emailAttr": "mail", // 邮件属性key
"nameAttr": "cn" //displayname 的属性key
},
"groupSearch": {
"baseDN": "ou=Groups,dc=example,dc=org",//用户组baseDN
"filter": "(objectClass=groupOfNames)", //查询过滤条件
"userAttr": "DN", //用户组成员id属性key
"groupAttr": "member", //用户组成员key
"nameAttr": "cn" //用户组名称key
}
}
c. 调用API,新增ldap idp,
curl -XPOST https://{auth_address}/apis/auth.tkestack.io/v1/identityproviders -H 'Authorization: Bearer {admin_token}' -H 'Content-Type: application/json'
Body:
{
"metadata": {
"name": "ldap-test" //tennatID
},
"spec": {
"name": "ldap-test",
"type": "ldap",
"administrators": [ //超级管理员
"jane"
],
"config": " {\"host\":\"localhost:389\",\"insecureNoSSL\":true,\"bindDN\":\"cn=admin,dc=example,dc=org\",\"bindPW\":\"admin\",\"usernamePrompt\":\"Email Address\",\"userSearch\":{\"baseDN\":\"ou=People,dc=example,dc=org\",\"filter\":\"(objectClass=person)\",\"username\":\"cn\",\"idAttr\":\"DN\",\"emailAttr\":\"mail\",\"nameAttr\":\"cn\"},\"groupSearch\":{\"baseDN\":\"ou=Groups,dc=example,dc=org\",\"filter\":\"(objectClass=groupOfNames)\",\"userAttr\":\"DN\",\"groupAttr\":\"member\",\"nameAttr\":\"cn\"}}" //ldap配置
}
}
d. 删除IDP
curl -XDELETE https://{auth_address}/apis/auth.tkestack.io/v1/identityproviders/ldap-test -H 'Authorization: Bearer {admin_token}'