Open floreks opened 7 years ago
It would be nice when I login with kubeconfig file to automatically show me the namespace from kubeconfig file instead of just showing default namespace by default.
Is there a ticket on the core side that tracks implementation of the API features/endpoints required for OIDC to work sensibly in dashboard?
I haven't been following core roadmap lately, so I don't know. We'll try to revisit it after angular migration.
What's the latest on this? I'm interested in having OIDC auth information published in the kube-public
namespace for interested clients to discover, for other reasons, in addition to possibly having the dashboard auth scenario be much simpler.
It would be also awesome if, when you go to some url (for example, dashboard/#!/log/namespace/pod
), and it required sign, it wouldn't forget your url and send you to the page you wanted, and not to overview of default namespace.
It would be absolutely fantastic if we could get some traction on this.
Also interested by the feature that @cohadar suggested :
It would be nice when I login with kubeconfig file to automatically show me the namespace from kubeconfig file instead of just showing default namespace by default.
Any news/info about this ? Thanks
Is there any integration on access to the dashboard and AWS IAM?
Many thanks.
Still waiting for this...
@sshishov You can wait or you can contribute. We are not able to do everything instantly with just a few people.
Any news regarding oidc support? :)
I know this things take a long time.. any news about it ?
The main issue is that we don't have anyone willing to work on that right now. Our main focus goes to designing and creating a new standalone gRPC API for Dashboard.
What's the status on OIDC support?
Allow logging in when a very long token is provided (i.e. Azure with groups, etc.)
What's the status on Allow logging in when a very long token is provided @floreks ?
@akhil117 If your organization has a large number of groups, probably you would need to allow only the groups you want to allow in your Cluster to avoid a huge authorization header that will be passed to the Kubernetes Dashboard. To do this you will need to select the groups in Azure AD Enterprise Applications → Search your application → Users and groups, and select the groups you want to authenticate in your cluster
Tracking issue for further non-critical login improvements.