Cluster Authentication
This plugin provides independent authentication integration for global cluster failure scenarios. When the global cluster fails, users can still log in through this service to access and operate the Kubernetes cluster, maintaining permissions consistent with the state before the global cluster failure (note: group permissions are not supported).
TOC
Overview
The authentication integration uses Connector Custom Resources (CRs) to configure OIDC or LDAP identity providers.
Connector CR Basics
- CR Kind:
Connector(apiVersion:dex.coreos.com/v1) - Namespace:
cpaas-system - Config Format: The
configfield must be a base64-encoded JSON string. Create your configuration as a JSON file, then encode it usingbase64 -w0 config.json(on macOS, the-w0flag can be omitted).
Connector CR Template:
Integrated with LDAP
LDAP Configuration
Example LDAP connector configuration:
Field descriptions:
Apply LDAP Connector
Step-by-step instructions:
Integrated with OIDC
OIDC Configuration
Example OIDC connector configuration:
Field descriptions:
Apply OIDC Connector
Step-by-step instructions:
Important Notes:
- Place Connector CRs in the
cpaas-systemnamespace to align with the global cluster setup. - Base64 encoding: On Linux use
base64 -w0 config.json, on macOS the-w0flag can be omitted.
Use AC CLI to Connect to ACP
This section describes how to use the AC CLI to authenticate and connect to the ACP (Application Control Plane) using the configured identity providers.
Prerequisites
Before using AC CLI to connect, ensure the following:
- AC CLI is installed (version >= 1.1)
- Cluster is reachable over the network
- External access address of the plugin auth service:
https://<clusterEndpoint>:<DefaultPort>(defaultDefaultPortis11780) - Connector is configured for the target IDP and the Connector CR name is confirmed
Verify the Connector configuration:
Example output:
Command Examples
Login with LDAP identity provider:
Login with OIDC identity provider:
For OIDC authentication, if interactive authentication is required, follow the CLI prompts to complete the login process.