Configuring an HTPasswd identity provider

    To define an HTPasswd identity provider you must perform the following steps:

    1. Create an htpasswd file to store the user and password information. Instructions are provided for Linux and .

    2. Create an OKD secret to represent the htpasswd file.

    3. .

    4. Apply the resource to the default OAuth configuration.

    Creating an HTPasswd file using Linux

    To use the HTPasswd identity provider, you must generate a flat file that contains the user names and passwords for your cluster by using htpasswd.

    Prerequisites

    • Have access to the htpasswd utility. On Red Hat Enterprise Linux this is available by installing the httpd-tools package.

    Procedure

    1. Create or update your flat file with a user name and hashed password:

      The command generates a hashed version of the password.

      For example:

      1. $ htpasswd -c -B -b users.htpasswd user1 MyPassword!

      Example output

      1. Adding password for user user1
    2. Continue to add or update credentials to the file:

      1. $ htpasswd -B -b </path/to/users.htpasswd> <user_name> <password>

    To use the HTPasswd identity provider, you must generate a flat file that contains the user names and passwords for your cluster by using .

    Prerequisites

    • Have access to htpasswd.exe. This file is included in the \bin directory of many Apache httpd distributions.

    Procedure

    1. Create or update your flat file with a user name and hashed password:

      1. > htpasswd.exe -c -B -b <\path\to\users.htpasswd> <user_name> <password>

      The command generates a hashed version of the password.

      For example:

      1. > htpasswd.exe -c -B -b users.htpasswd user1 MyPassword!

      Example output

      1. Adding password for user user1
    2. Continue to add or update credentials to the file:

      1. > htpasswd.exe -b <\path\to\users.htpasswd> <user_name> <password>

    Creating the HTPasswd secret

    Prerequisites

    • Create an HTPasswd file.

    Procedure

    • Create a Secret object that contains the HTPasswd users file:

      1The secret key containing the users file for the —from-file argument must be named htpasswd, as shown in the above command.

    The following custom resource (CR) shows the parameters and acceptable values for an HTPasswd identity provider.

    HTPasswd CR

    1. apiVersion: config.openshift.io/v1
    2. kind: OAuth
    3. metadata:
    4. name: cluster
    5. spec:
    6. identityProviders:
    7. - name: my_htpasswd_provider (1)
    8. mappingMethod: claim (2)
    9. type: HTPasswd
    10. htpasswd:
    11. fileData:
    12. name: htpass-secret (3)
    1This provider name is prefixed to provider user names to form an identity name.
    2Controls how mappings are established between this provider’s identities and User objects.
    3An existing secret containing a file generated using .

    Additional resources

    Adding an identity provider to your clusters

    After you install your cluster, add an identity provider to it so your users can authenticate.

    Prerequisites

    • Create an OKD cluster.

    • Create the custom resource (CR) for your identity providers.

    • You must be logged in as an administrator.

    Procedure

    1. Apply the defined CR:

      1. $ oc apply -f </path/to/CR>
    2. Log in to the cluster as a user from your identity provider, entering the password when prompted.

      1. $ oc login -u <username>
    3. Confirm that the user logged in successfully, and display the user name.

      1. $ oc whoami

    You can add or remove users from an existing HTPasswd identity provider.

    Prerequisites

    • You have created a Secret object that contains the HTPasswd user file. This procedure assumes that it is named htpass-secret.

    • You have configured an HTPasswd identity provider. This procedure assumes that it is named .

    Procedure

    1. Retrieve the HTPasswd file from the htpass-secret Secret object and save the file to your file system:

      1. $ oc get secret htpass-secret -ojsonpath={.data.htpasswd} -n openshift-config | base64 --decode > users.htpasswd
    2. Add or remove users from the users.htpasswd file.

      • To add a new user:

        1. $ htpasswd -bB users.htpasswd <username> <password>

        Example output

      • To remove an existing user:

        1. $ htpasswd -D users.htpasswd <username>

        Example output

        1. Deleting password for user <username>
    3. Replace the htpass-secret Secret object with the updated users in the users.htpasswd file:

      1. $ oc create secret generic htpass-secret --from-file=htpasswd=users.htpasswd --dry-run=client -o yaml -n openshift-config | oc replace -f -

      You can alternatively apply the following YAML to replace the secret:

      1. apiVersion: v1
      2. kind: Secret
      3. metadata:
      4. name: htpass-secret
      5. namespace: openshift-config
      6. type: Opaque
      7. data:
      8. htpasswd: <base64_encoded_htpasswd_file_contents>
    4. If you removed one or more users, you must additionally remove existing resources for each user.

      1. Delete the User object:

        1. $ oc delete user <username>

        Example output

        1. user.user.openshift.io "<username>" deleted

        Be sure to remove the user, otherwise the user can continue using their token as long as it has not expired.

      2. Delete the Identity object for the user:

        Example output

    Configuring identity providers using the web console

    Configure your identity provider (IDP) through the web console instead of the CLI.

    Prerequisites

    • You must be logged in to the web console as a cluster administrator.

    Procedure

    1. Navigate to AdministrationCluster Settings.

    2. Under the Global Configuration tab, click OAuth.

    3. Under the Identity Providers section, select your identity provider from the Add drop-down menu.