$ htpasswd -c -B -b </path/to/users.htpasswd> <user_name> <password>
By default, only a kubeadmin
user exists on your cluster. To specify an
identity provider, you must create a Custom Resource (CR) that describes
that identity provider and add it to the cluster.
OpenShift Container Platform user names containing |
To define an HTPasswd identity provider you must perform the following steps:
Create an htpasswd
file to store the user and password information.
Instructions are provided for
Linux
and
Windows.
Create
an OpenShift Container Platform secret to represent the htpasswd
file.
To use the HTPasswd identity provider, you must generate a flat file that
contains the user names and passwords for your cluster by using
htpasswd
.
Have access to the htpasswd
utility. On Red Hat Enterprise Linux
this is available by installing the httpd-tools
package.
Create or update your flat file with a user name and hashed password:
$ htpasswd -c -B -b </path/to/users.htpasswd> <user_name> <password>
The command generates a hashed version of the password.
For example:
$ htpasswd -c -B -b users.htpasswd user1 MyPassword!
Adding password for user user1
Continue to add or update credentials to the file:
$ htpasswd -B -b </path/to/users.htpasswd> <user_name> <password>
To use the HTPasswd identity provider, you must generate a flat file that
contains the user names and passwords for your cluster by using
htpasswd
.
Have access to htpasswd.exe
. This file is included in the \bin
directory of many Apache httpd distributions.
Create or update your flat file with a user name and hashed password:
> htpasswd.exe -c -B -b <\path\to\users.htpasswd> <user_name> <password>
The command generates a hashed version of the password.
For example:
> htpasswd.exe -c -B -b users.htpasswd user1 MyPassword!
Adding password for user user1
Continue to add or update credentials to the file:
> htpasswd.exe -b <\path\to\users.htpasswd> <user_name> <password>
To use the HTPasswd identity provider, you must define a secret that contains the HTPasswd user file.
Create an HTPasswd file.
Create an OpenShift Container Platform secret
object that contains the HTPasswd users file.
$ oc create secret generic htpass-secret --from-file=htpasswd=</path/to/users.htpasswd> -n openshift-config
The secret key containing the users file for the |
The following custom resource (CR) shows the parameters and acceptable values for an HTPasswd identity provider.
apiVersion: config.openshift.io/v1
kind: OAuth
metadata:
name: cluster
spec:
identityProviders:
- name: my_htpasswd_provider (1)
mappingMethod: claim (2)
type: HTPasswd
htpasswd:
fileData:
name: htpass-secret (3)
1 | This provider name is prefixed to provider user names to form an identity name. |
2 | Controls how mappings are established between this provider’s identities and User objects. |
3 | An existing secret containing a file generated using
htpasswd . |
See Identity provider parameters for information on parameters, such as mappingMethod
, that are common to all identity providers.
After you install your cluster, add an identity provider to it so your users can authenticate.
Create an OpenShift Container Platform cluster.
Create the custom resource (CR) for your identity providers.
You must be logged in as an administrator.
Apply the defined CR:
$ oc apply -f </path/to/CR>
If a CR does not exist, |
Log in to the cluster as a user from your identity provider, entering the password when prompted.
$ oc login -u <username>
Confirm that the user logged in successfully, and display the user name.
$ oc whoami
You can add or remove users from an existing HTPasswd identity provider.
You have created a secret
object that contains the HTPasswd user file. This procedure assumes that it is named htpass-secret
.
You have configured an HTPasswd identity provider. This procedure assumes that it is named my_htpasswd_provider
.
You have access to the htpasswd
utility. On Red Hat Enterprise Linux this is available by installing the httpd-tools
package.
You have cluster administrator privileges.
Retrieve the HTPasswd file from the htpass-secret
secret
object and save the file to your file system:
$ oc get secret htpass-secret -ojsonpath={.data.htpasswd} -n openshift-config | base64 --decode > users.htpasswd
Add or remove users from the users.htpasswd
file.
To add a new user:
$ htpasswd -bB users.htpasswd <username> <password>
Adding password for user <username>
To remove an existing user:
$ htpasswd -D users.htpasswd <username>
Deleting password for user <username>
Replace the htpass-secret
secret
object with the updated users in the users.htpasswd
file:
$ oc create secret generic htpass-secret --from-file=htpasswd=users.htpasswd --dry-run=client -o yaml -n openshift-config | oc replace -f -
If you removed one or more users, you must additionally remove existing resources for each user.
Delete the User
object:
$ oc delete user <username>
user.user.openshift.io "<username>" deleted
Be sure to remove the user, otherwise the user can continue using their token as long as it has not expired.
Delete the Identity
object for the user:
$ oc delete identity my_htpasswd_provider:<username>
identity.user.openshift.io "my_htpasswd_provider:<username>" deleted
Configure your identity provider (IDP) through the web console instead of the CLI.
You must be logged in to the web console as a cluster administrator.
Navigate to Administration → Cluster Settings.
Under the Global Configuration tab, click OAuth.
Under the Identity Providers section, select your identity provider from the Add drop-down menu.
You can specify multiple IDPs through the web console without overwriting existing IDPs. |