2021-05-13 16:50:07 +00:00
---
2021-07-27 00:18:44 +00:00
title: Configure the Pinniped Supervisor to use Okta as an OIDC provider
2021-05-13 16:50:07 +00:00
description: Set up the Pinniped Supervisor to use Okta login.
cascade:
layout: docs
menu:
docs:
2021-05-26 17:08:03 +00:00
name: Configure Supervisor With Okta OIDC
2021-05-25 23:15:45 +00:00
weight: 80
2021-05-13 16:50:07 +00:00
parent: howtos
---
2021-05-25 02:08:01 +00:00
The Supervisor is an [OpenID Connect (OIDC) ](https://openid.net/connect/ ) issuer that supports connecting a single
"upstream" identity provider to many "downstream" cluster clients.
2021-05-13 16:50:07 +00:00
This guide shows you how to configure the Supervisor so that users can authenticate to their Kubernetes
cluster using their Okta credentials.
## Prerequisites
This how-to guide assumes that you have already [installed the Pinniped Supervisor ]({{< ref "install-supervisor" >}} ) with working ingress,
2021-05-25 02:08:01 +00:00
and that you have [configured a FederationDomain to issue tokens for your downstream clusters ]({{< ref "configure-supervisor" >}} ).
2021-05-13 16:50:07 +00:00
2021-05-24 15:29:43 +00:00
## Create an Okta Application
2021-05-13 16:50:07 +00:00
2021-05-24 15:29:43 +00:00
Follow the instructions for [setting up an app using authcode flow ](https://developer.okta.com/docs/guides/implement-auth-code/setup-app/ ) and create an app.
2021-05-13 16:50:07 +00:00
Optionally follow the instructions for [customizing tokens returned from Okta with a groups claim ](https://developer.okta.com/docs/guides/customize-tokens-groups-claim/overview/ )
if you want to pass users' Okta group information through to your Kubernetes clusters.
2021-05-24 15:29:43 +00:00
For example, to create an app:
2021-05-13 16:50:07 +00:00
2021-05-24 15:29:43 +00:00
1. In the Okta Admin Console, navigate to _Applications_ > _Applications_ .
1. Create a new app:
1. Click `Create App Integration` .
1. For `Sign-on method` , select `OIDC` .
1. For `Application type` , app `Web Application` , then click next.
1. Enter a name for your app, such as "My Kubernetes Clusters".
2021-05-13 16:50:07 +00:00
1. Enter the sign-in redirect URI. This is the `spec.issuer` you configured in your `FederationDomain` appended with `/callback` .
1. Optionally select `Limit access to selected groups` to restrict which Okta users can log in to Kubernetes using this integration.
2021-05-24 15:29:43 +00:00
1. Save the app and make note of the _Client ID_ and _Client secret_ .
1. Navigate to the _Sign On_ tab > _OpenID Connect ID Token_ and click `Edit` . Fill in the Groups claim filter.
2021-05-13 16:50:07 +00:00
For example, for all groups to be present under the claim name `groups` , fill in "groups" in the first box, then select "Matches regex" and ".*".
2021-05-24 15:29:43 +00:00
## Configure the Supervisor
2021-05-13 16:50:07 +00:00
Create an [OIDCIdentityProvider ](https://github.com/vmware-tanzu/pinniped/blob/main/generated/1.20/README.adoc#oidcidentityprovider ) in the same namespace as the Supervisor.
For example, this OIDCIdentityProvider and corresponding Secret use Okta's `email` claim as the Kubernetes username:
```yaml
apiVersion: idp.supervisor.pinniped.dev/v1alpha1
kind: OIDCIdentityProvider
metadata:
namespace: pinniped-supervisor
name: okta
spec:
2021-05-24 15:29:43 +00:00
# Specify the upstream issuer URL (no trailing slash).
2021-05-13 16:50:07 +00:00
issuer: https://my-company.okta.com
# Request any scopes other than "openid" for claims besides
# the default claims in your token. The "openid" scope is always
# included.
#
# To learn more about how to customize the claims returned, see here:
# https://developer.okta.com/docs/guides/customize-tokens-returned-from-okta/overview/
authorizationConfig:
2021-05-24 15:29:43 +00:00
additionalScopes: [groups, email]
2021-05-13 16:50:07 +00:00
# Specify how Okta claims are mapped to Kubernetes identities.
claims:
# Specify the name of the claim in your Okta token that will be mapped
# to the "username" claim in downstream tokens minted by the Supervisor.
username: email
# Specify the name of the claim in Okta that represents the groups
# that the user belongs to. This matches what you specified above
# with the Groups claim filter.
groups: groups
# Specify the name of the Kubernetes Secret that contains your Okta
# application's client credentials (created below).
client:
secretName: okta-client-credentials
---
apiVersion: v1
kind: Secret
metadata:
namespace: pinniped-supervisor
name: okta-client-credentials
type: secrets.pinniped.dev/oidc-client
stringData:
# The "Client ID" that you got from Okta.
clientID: "< your-client-id > "
2021-05-24 15:29:43 +00:00
# The "Client secret" that you got from Okta.
2021-05-13 16:50:07 +00:00
clientSecret: "< your-client-secret > "
```
Once your OIDCIdentityProvider has been created, you can validate your configuration by running:
```shell
kubectl describe OIDCIdentityProvider -n pinniped-supervisor okta
```
Look at the `status` field. If it was configured correctly, you should see `phase: Ready` .
2021-05-24 15:29:43 +00:00
## Next steps
2021-05-13 16:50:07 +00:00
2021-07-21 19:10:47 +00:00
Next, [configure the Concierge to validate JWTs issued by the Supervisor ]({{< ref "configure-concierge-supervisor-jwt" >}} )!
Then you'll be able to log into those clusters as any of the users from the Okta directory.