Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Groups claim not working with kubelogin and azure AD #1054

Open
RahmanBadru opened this issue Feb 22, 2024 · 1 comment
Open

Groups claim not working with kubelogin and azure AD #1054

RahmanBadru opened this issue Feb 22, 2024 · 1 comment
Labels
question Further information is requested

Comments

@RahmanBadru
Copy link

Describe the question

After setting up kubelogin and the oidc on my apiserver and creating a user with kubectl with the required parameters, i created a clusterrolebinding for the groups available and running any kubectl command still shows my user doesnt have access, it basically picks my user

To reproduce

 To configure user:
kubectl config set-credentials oidc \
          --exec-api-version=client.authentication.k8s.io/v1beta1 \
          --exec-command=kubectl \
          --exec-arg=oidc-login \
          --exec-arg=get-token \
          --exec-arg=--oidc-issuer-url=https://sts.windows.net/tenant-id/ \
          --exec-arg=--oidc-client-id=client-id \
          --exec-arg=--oidc-client-secret=secret \
          --exec-arg=--oidc-extra-scope=groups

Your environment

  • OS: e.g. Linux
  • kubelogin version: v1.28
  • kubectl version: e.g. v1.27
  • OpenID Connect provider: Azure
@RahmanBadru RahmanBadru added the question Further information is requested label Feb 22, 2024
@jan104
Copy link

jan104 commented Mar 2, 2024

can you share the adjustments you made to the apiserver and the clusterrolebinding?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
question Further information is requested
Projects
None yet
Development

No branches or pull requests

2 participants