Configure the oidc identity provider to integrate with an OpenID Connect identity provider using an Authorization Code Flow.
- You created your account roles using Terraform.
- You created your cluster using Terraform. This cluster can either have a managed OIDC configuration or an unmanaged OIDC configuration.
- Optional: You have configured your Terraform.tfvars file.
For more information about OpenID connect authentication and configuration, see About OpenID Connect authentication.
-
You need to either create
terraform.tfvars
file in this directory or add the following items to your existing*.tfvars
file. You may also export these variables as environmental variables with the following commands: variable "" { type = string description = "An RFC 2255 URL which specifies the LDAP search parameters to use." }- This variable is a Boolean expression that allows you to decide if TLS connections to the server are allowed. The default value is false.
export TF_VAR_ldap_insecure=<true_or_false>
- This variable points to an RFC 2255 URL for your LDAP search parameters.
export TF_VAR_ldap_url=<URL_for_parameters>
- This variable should be your full OpenShift Cluster Manager offline token that you generated in the prerequisites.
export TF_VAR_token=<ocm_offline_token>
- This value should point to your OpenShift instance.
export TF_VAR_url=<ocm_url>
- The ID of the cluster for which you are creating the identity provider. This ID can be found in the
rosa
command-line interface (CLI) with the commandrosa list cluster
.export TF_VAR_cluster_id=<cluster_id>
- Optional: This variable includes any additional trust certificate authority bundles.
export TF_VAR_ldap_ca=<trust-certificate-authority-bundle>
- This variable is a Boolean expression that allows you to decide if TLS connections to the server are allowed. The default value is false.
-
In your local copy of the
github
folder, run the following command:terraform init
Running this command accesses all the necessary provider information to apply your Terraform plan.
-
Optional: Run the
plan
command to ensure that your Terraform files build correctly without errors. This is not required to apply your Terraform plan.terraform plan -out github.tfplan
-
Run the apply command to create your GitHub identity provider.
Note: If you did not run the
plan
command, you can simply justapply
without specifying a file.terraform apply <"github.tfplan">
-
The Terraform applies the plan and creates your identity provider using GitHub. You will see a prompt to confirm you want to create these resources. Enter
yes
, then the process will complete with your resources.
After you are done with the resources you created, you should not delete them manually, but instead, use the destroy
command. Run the following to delete all of your created resources:
terraform destroy
After the command is complete, your resources are deleted.
NOTE: If you manually delete a resource, you create unresolvable issues within your environment.