Inherrit user priviledges from Keycloak #2707
-
Hello, |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments
-
Hello @pirankashani! I'm here to help you with any bugs, questions, or contributions you have. Let's tackle this together! Headlamp supports OIDC integration with Keycloak, allowing users to log in using their Keycloak credentials. However, the specific mapping of Keycloak roles to Kubernetes RBAC roles, which would determine user privileges in Headlamp, is not directly handled by Headlamp itself. Instead, this mapping is typically managed through Kubernetes RBAC configurations. To achieve role mapping, you would need to:
While Headlamp itself does not provide built-in support for customizing role-based access control, it relies on Kubernetes RBAC for authorization, so the role mapping needs to be configured at the Kubernetes level. Unfortunately, there is no specific documentation in Headlamp for extending or customizing role mapping functionality [1][2]. To continue talking to Dosu, mention @dosu. Help Dosu learn! Give it feedback: Great Response | Irrelevant Answer | Incorrect Sources | Too Verbose | Hallucination | Other |
Beta Was this translation helpful? Give feedback.
-
Hey @pirankashani, some more context on this response. Headlamp supports OIDC integration with Keycloak, allowing users to log in using their Keycloak credentials. However, the specific mapping of Keycloak roles to Kubernetes RBAC roles, which would determine user privileges in Headlamp, is not directly handled by Headlamp itself. Instead, this mapping is typically managed through Kubernetes RBAC configurations. To achieve role mapping, you would need to:
Headlamp will respect these RBAC configurations and automatically limit user access based on the permissions granted through the role bindings. The UI will adapt to show only the resources and actions that the authenticated user has permission to access. |
Beta Was this translation helpful? Give feedback.
Hey @pirankashani, some more context on this response.
Headlamp supports OIDC integration with Keycloak, allowing users to log in using their Keycloak credentials. However, the specific mapping of Keycloak roles to Kubernetes RBAC roles, which would determine user privileges in Headlamp, is not directly handled by Headlamp itself. Instead, this mapping is typically managed through Kubernetes RBAC configurations.
To achieve role mapping, you would need to:
Configure Keycloak:
Set Up Kubernetes RBAC: