-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Kubernetes Dashboard fails to authorise with group-based RBAC #6349
Comments
As a note, I was debugging this briefly with a Kubermatic partner, and we saw the groups included in the OIDC token used by the Kubernetes Dashboard. It was therefore not clear to us why groups were seemingly ignored. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with /lifecycle stale |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with /lifecycle rotten |
/remove-lifecycle rotten |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with /lifecycle stale |
/remove-lifecycle stale |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with /lifecycle stale |
/remove-lifecycle stale |
Should be fixed through #7014; if not please re-open. |
What happened
I wanted to assign RBAC to users accessing my user cluster in KKP. Since they are all in OIDC groups and the KKP setup has OIDC for user clusters enabled, I only assigned group-based RBAC. When those users that only have access via group-based RBAC try to use the Kubernetes Dashboard built into KKP, they are getting errors insinuating that they do not have proper permissions:
However, the same users can access the cluster via an OIDC-based kubeconfig downloaded from the KKP dashboard just fine. As a example from the error above: Accessing the list of nodes (and any other resources) works via
kubectl
, but not via the Kubernetes Dashboard (proxy). The dashboard stays empty.Expected behavior
OIDC access via kubectl / kubeconfig or Kubernetes Dashboard based access should be consistent, my users should have access to the same resources via the Kubernetes Dashboard just based on group permissions.
How to reproduce
kubectl get nodes
that you no longer have permissions.oidc:
prefix; an example isoidc:kubermatic:development
). Chosecluster-admin
as role for simplicity.kubectl get nodes
again.Environment
v2.24.0-beta.1
(but also found on 2.23)v2.24.0-beta.1
(but also found on 2.23)Current workaround
Add user-based RBAC bindings for each user.
Affected user persona
Developers given access to user clusters
Business goal to be improved
Metric to be improved
The text was updated successfully, but these errors were encountered: