-
Notifications
You must be signed in to change notification settings - Fork 14.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs/admin: document OpenID Connect plugin's claim prefixing #2894
docs/admin: document OpenID Connect plugin's claim prefixing #2894
Conversation
Definitely needed to avoid the same headache as I experienced (https://kubernetes.slack.com/archives/C0EN96KUY/p1489149455491351 and https://kubernetes.slack.com/archives/C0EN96KUY/p1489769038422139) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
3f955fc
to
2d8143b
Compare
@@ -256,6 +256,16 @@ To enable the plugin, configure the following flags on the API server: | |||
| `--oidc-groups-claim` | JWT claim to use as the user's group. If the claim is present it must be an array of strings. | groups | No | | |||
| `--oidc-ca-file` | The path to the certificate for the CA that signed your identity provider's web certificate. Defaults to the host's root CAs. | `/etc/kubernetes/ssl/kc-ca.pem` | No | | |||
|
|||
If a claim other than `email` is chosen for `--oidc-username-claim`, the value |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
include a note in the table for the --oidc-username-claim... they might not make it this far otherwise
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thanks, updated.
2d8143b
to
b57ce69
Compare
b57ce69
to
bdf2b6e
Compare
cc @liggitt @deads2k @rithujohn191
closes kubernetes/kubernetes#31380
This change is