Skip to content

docs: Provide documentation with examples on implementing OIDC RBAC #3390

@mjudeikis

Description

@mjudeikis

Feature Description

Imagine a situation:

  • Single kcp instance with OIDC provider connected to it.
  • Many vendors/companies use the same instance with their own UI/CLI tooling.

I want to be able to do a few things:
Based on user attributes (group or scope) in jwt token from oidc provider to grant access to APIExports. Potentially with configurable behaviour like "FilterOut" or "Deny", where multiple could be provided.

Bonus: kcp could expose possible "scopes" as a separate API (similar as .well-known file in oidc)

Proposed Solution

  1. Extend kcp to be jwt attributes aware
  2. Add scoping (potentially to warrants machinery)

Alternative Solutions

No response

Want to contribute?

  • I would like to work on this issue.

Additional Context

No response

Metadata

Metadata

Assignees

Labels

kind/documentationCategorizes issue or PR as related to documentation.

Type

No type

Projects

Status

Done

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions