You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
First of all, thank you very much for this great project that works extremely well ❤️ I have been testing it intensively for several weeks now 🚀
The connection via Keycloak with a user of a realm works perfectly, coupled with RBAC, I can give the rights that suit me.
I would like to add a layer of security by requiring users to have a client certificate to authenticate in addition to the identifier and password.
In the documentation, a priori it is not possible to pass a client certificate to Keycloak to authenticate, even through the oidc-auth-request-extra-params parameter I have not found how to do it.
So my question is simple, is it possible for kubelogin to provide, during its request to Keycloak, a client certificate that will be part of the authentication?
To reproduce
Configure Keycloak to have X509 authentification:
Added the X509_CA_BUNDLE environment variable in the container. This variable points to the CA used for the client certificate
Describe the question
First of all, thank you very much for this great project that works extremely well ❤️ I have been testing it intensively for several weeks now 🚀
The connection via Keycloak with a user of a realm works perfectly, coupled with RBAC, I can give the rights that suit me.
I would like to add a layer of security by requiring users to have a client certificate to authenticate in addition to the identifier and password.
In the documentation, a priori it is not possible to pass a client certificate to Keycloak to authenticate, even through the
oidc-auth-request-extra-params parameter
I have not found how to do it.So my question is simple, is it possible for kubelogin to provide, during its request to Keycloak, a client certificate that will be part of the authentication?
To reproduce
Configure Keycloak to have X509 authentification:
My Kubeconfig:
user:
exec:
apiVersion: client.authentication.k8s.io/v1beta1
args:
- oidc-login
- get-token
- --oidc-issuer-url=https://keycloak.test/realms/x509
- --oidc-client-id=test
- --username=tonystark
- --token-cache-dir=~/.kube/cache/oidc-login/tony@kind-poc-newyear
command: kubectl
env: null
interactiveMode: IfAvailable
provideClusterInfo: false
Your environment
The text was updated successfully, but these errors were encountered: