48 lines
1.5 KiB
Markdown

OKD - Authentication
====================
OKD suport a lot of authentication methods such as LDAP, HTPasswd, Keystone and so on.
By default OKD will grant access to any user and any password because **AllowAllPasswordIdentityProvider** is probably enabled.
HTPasswd
--------
Just to simplify and create the simplest secure authentication, login through ssh in [okd.example.com:8443](okd.example.com:8443) and create an **htpasswd** file with an user and a password:
htpasswd -bc /etc/origin/master/htpasswd okd pass123
Verify if the password match the user you choose:
htpasswd -v /etc/origin/master/htpasswd okd
Now, go to the **master-config.yml** in */etc/origin/master/master-config.yaml* and change the only **identityProvider**:
...
identityProviders:
- challenge: true
login: true
mappingMethod: claim
name: allow_all
provider:
apiVersion: v1
kind: AllowAllPasswordIdentityProvider
...
- name: htpasswd
challenge: true
login: true
mappingMethod: claim
provider:
apiVersion: v1
kind: HTPasswdPasswordIdentityProvider
file: /etc/origin/master/htpasswd
Restar the master api and controllers to apply the new configuration:
/usr/local/bin/master-restart api
/usr/local/bin/master-restart controllers
Try login trough the **webconsole** or **cli** and after that you can see the user you created with:
oc get user
oc get identity