Parameters
The parent key for all of the following parameters is openshift4_authentication
.
namespace
type |
string |
default |
|
The namespace in which to create manifests.
The component may not work correctly if this parameter is changed. |
sudoGroupName
type |
string |
default |
|
The OpenShift group name for which the component configures RBAC to allow members to impersonate users, groups, and service accounts, including the cluster administrator. See Cluster Admin Sudo and Impersonating Users for more details.
This parameter is deprecated and will be removed in a future release.
Use |
sudoGroups
type |
list |
default |
|
The OpenShift group names for which the component configures RBAC to allow members to impersonate users, groups, and service accounts, including the cluster administrator. See Cluster Admin Sudo and Impersonating Users for more details.
Groups can be removed from the hierarchy by prefixing them with a ~
character.
adminUserName
type |
string |
default |
|
The username used for cluster administrator impersonation.
identityProviders
type |
dict |
default |
|
This key allows users to configure arbitrary OpenShift identity providers. Please see the upstream documentation for supported configurations.
The component processes the contents of the dict into a list of identityProvider
entries for the OpenShift 4 OAuth
object.
The dict keys are only present to allow users to modify existing entries in the hierarchy.
They don’t appear in the generated manifests.
The component doesn’t validate the provided configurations. |
Currently, the component only supports configuring a custom CA certificate for LDAP identity providers. |
The component accepts custom CA certificate bundles for LDAP providers in key |
Users should use the component’s secret configuration mechanism to deploy secrets containing identity provider credentials.
There are different black-/whitelist parameters for the sync and the prune jobs, as they require different parameters.
|
templates
type |
dict |
default |
|
This parameter allows users to configure templates for the OpenShift authentication error, login, and provider selection pages.
The component expects keys err
, login
and providerSelection
in this parameter.
The contents of those keys are used verbatim as the corresponding templates.
If any templates are configured, the component will create a single Secret called oauth-templates
.
The component writes each configured template to the secret in the keys documented in the upstream documentation on customizing the login page.
We use key err instead of error because error is a keyword in Jsonnet.
|
token
type |
dict |
default |
|
This parameter allows users to customize the OAuth access token expiration.
Key timeoutSeconds
can be set to configure the desired value for the token’s inactivity timeout.
See the upstream documentation on configuring token inactivity timeout for the internal OAuth server for more details.
Key maxAgeSeconds
can be set to configure the desired value for the token’s maximum life time.
See the upstream documentation on configuring the internal OAuth server’s token duration for more details.
ldapSync
type |
string |
default |
|
This parameter allows configuring the LDAP sync CronJob schedule. The schedule defined here will be applied for LDAP identity providers which don’t configure their own custom schedule.
The component will apply the logic documented in the Project Syn Jsonnet best practices on randomizing cron schedules to avoid generating load spikes on an LDAP server.
The component may break if you specify a schedule which doesn’t contain exactly one %d format specifier.
|
secrets
type |
dict |
default |
|
This parameter allows users to configure arbitrary secrets.
The contents of the parameter are transformed into Secret
resources.
See the how-to on configuring secrets for more details.
groupMemberships
type |
dict |
default |
|
This parameter allows users to configure arbitrary OpenShift groups and group memberships.
See the how-to on managing group memberships for more details.