Update comment for skipGroupRefresh
This commit is contained in:
parent
e2c6dcd6e6
commit
b9582f864e
@ -132,10 +132,30 @@ type ActiveDirectoryIdentityProviderGroupSearch struct {
|
|||||||
// +optional
|
// +optional
|
||||||
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
|
||||||
// SkipGroupRefresh skips the group refresh operation that occurs with each refresh
|
// The user's group membership is refreshed as they interact with the supervisor
|
||||||
// (every 5 minutes). This can be done if group search is very slow or resource intensive for the AD
|
// to obtain new credentials (as their old credentials expire). This allows group
|
||||||
// server.
|
// membership changes to be quickly reflected into Kubernetes clusters. Since
|
||||||
SkipGroupRefresh bool `json:"skipGroupRefresh"`
|
// group membership is often used to bind authorization policies, it is important
|
||||||
|
// to keep the groups observed in Kubernetes clusters in-sync with the identity
|
||||||
|
// provider.
|
||||||
|
//
|
||||||
|
// In some environments, frequent group membership queries may result in a
|
||||||
|
// significant performance impact on the identity provider and/or the supervisor.
|
||||||
|
// The best approach to handle performance impacts is to tweak the group query
|
||||||
|
// to be more performant, for example by disabling nested group search or by
|
||||||
|
// using a more targeted group search base.
|
||||||
|
//
|
||||||
|
// If the group search query cannot be made performant and you are willing to
|
||||||
|
// have group memberships remain static for approximately a day, then set
|
||||||
|
// skipGroupRefresh to true. This is an insecure configuration as authorization
|
||||||
|
// policies that are bound to group membership will not notice if a user has
|
||||||
|
// been removed from a particular group until their next login.
|
||||||
|
//
|
||||||
|
// This is an experimental feature that may be removed or significantly altered
|
||||||
|
// in the future. Consumers of this configuration should carefully read all
|
||||||
|
// release notes before upgrading to ensure that the meaning of this field has
|
||||||
|
// not changed.
|
||||||
|
SkipGroupRefresh bool `json:"skipGroupRefresh,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Spec for configuring an ActiveDirectory identity provider.
|
// Spec for configuring an ActiveDirectory identity provider.
|
||||||
|
@ -120,10 +120,30 @@ type LDAPIdentityProviderGroupSearch struct {
|
|||||||
// +optional
|
// +optional
|
||||||
Attributes LDAPIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
Attributes LDAPIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
|
||||||
// SkipGroupRefresh skips the group refresh operation that occurs with each refresh
|
// The user's group membership is refreshed as they interact with the supervisor
|
||||||
// (every 5 minutes). This can be done if group search is very slow or resource intensive for the LDAP
|
// to obtain new credentials (as their old credentials expire). This allows group
|
||||||
// server.
|
// membership changes to be quickly reflected into Kubernetes clusters. Since
|
||||||
SkipGroupRefresh bool `json:"skipGroupRefresh"`
|
// group membership is often used to bind authorization policies, it is important
|
||||||
|
// to keep the groups observed in Kubernetes clusters in-sync with the identity
|
||||||
|
// provider.
|
||||||
|
//
|
||||||
|
// In some environments, frequent group membership queries may result in a
|
||||||
|
// significant performance impact on the identity provider and/or the supervisor.
|
||||||
|
// The best approach to handle performance impacts is to tweak the group query
|
||||||
|
// to be more performant, for example by disabling nested group search or by
|
||||||
|
// using a more targeted group search base.
|
||||||
|
//
|
||||||
|
// If the group search query cannot be made performant and you are willing to
|
||||||
|
// have group memberships remain static for approximately a day, then set
|
||||||
|
// skipGroupRefresh to true. This is an insecure configuration as authorization
|
||||||
|
// policies that are bound to group membership will not notice if a user has
|
||||||
|
// been removed from a particular group until their next login.
|
||||||
|
//
|
||||||
|
// This is an experimental feature that may be removed or significantly altered
|
||||||
|
// in the future. Consumers of this configuration should carefully read all
|
||||||
|
// release notes before upgrading to ensure that the meaning of this field has
|
||||||
|
// not changed.
|
||||||
|
SkipGroupRefresh bool `json:"skipGroupRefresh,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Spec for configuring an LDAP identity provider.
|
// Spec for configuring an LDAP identity provider.
|
||||||
|
@ -120,13 +120,29 @@ spec:
|
|||||||
it, you can set the filter to "(&(objectClass=group)(member={})"
|
it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
type: string
|
type: string
|
||||||
skipGroupRefresh:
|
skipGroupRefresh:
|
||||||
description: SkipGroupRefresh skips the group refresh operation
|
description: "The user's group membership is refreshed as they
|
||||||
that occurs with each refresh (every 5 minutes). This can be
|
interact with the supervisor to obtain new credentials (as their
|
||||||
done if group search is very slow or resource intensive for
|
old credentials expire). This allows group membership changes
|
||||||
the AD server.
|
to be quickly reflected into Kubernetes clusters. Since group
|
||||||
|
membership is often used to bind authorization policies, it
|
||||||
|
is important to keep the groups observed in Kubernetes clusters
|
||||||
|
in-sync with the identity provider. \n In some environments,
|
||||||
|
frequent group membership queries may result in a significant
|
||||||
|
performance impact on the identity provider and/or the supervisor.
|
||||||
|
The best approach to handle performance impacts is to tweak
|
||||||
|
the group query to be more performant, for example by disabling
|
||||||
|
nested group search or by using a more targeted group search
|
||||||
|
base. \n If the group search query cannot be made performant
|
||||||
|
and you are willing to have group memberships remain static
|
||||||
|
for approximately a day, then set skipGroupRefresh to true.
|
||||||
|
\ This is an insecure configuration as authorization policies
|
||||||
|
that are bound to group membership will not notice if a user
|
||||||
|
has been removed from a particular group until their next login.
|
||||||
|
\n This is an experimental feature that may be removed or significantly
|
||||||
|
altered in the future. Consumers of this configuration should
|
||||||
|
carefully read all release notes before upgrading to ensure
|
||||||
|
that the meaning of this field has not changed."
|
||||||
type: boolean
|
type: boolean
|
||||||
required:
|
|
||||||
- skipGroupRefresh
|
|
||||||
type: object
|
type: object
|
||||||
host:
|
host:
|
||||||
description: 'Host is the hostname of this Active Directory identity
|
description: 'Host is the hostname of this Active Directory identity
|
||||||
|
@ -112,13 +112,29 @@ spec:
|
|||||||
the default will act as if the Filter were specified as "member={}".
|
the default will act as if the Filter were specified as "member={}".
|
||||||
type: string
|
type: string
|
||||||
skipGroupRefresh:
|
skipGroupRefresh:
|
||||||
description: SkipGroupRefresh skips the group refresh operation
|
description: "The user's group membership is refreshed as they
|
||||||
that occurs with each refresh (every 5 minutes). This can be
|
interact with the supervisor to obtain new credentials (as their
|
||||||
done if group search is very slow or resource intensive for
|
old credentials expire). This allows group membership changes
|
||||||
the LDAP server.
|
to be quickly reflected into Kubernetes clusters. Since group
|
||||||
|
membership is often used to bind authorization policies, it
|
||||||
|
is important to keep the groups observed in Kubernetes clusters
|
||||||
|
in-sync with the identity provider. \n In some environments,
|
||||||
|
frequent group membership queries may result in a significant
|
||||||
|
performance impact on the identity provider and/or the supervisor.
|
||||||
|
The best approach to handle performance impacts is to tweak
|
||||||
|
the group query to be more performant, for example by disabling
|
||||||
|
nested group search or by using a more targeted group search
|
||||||
|
base. \n If the group search query cannot be made performant
|
||||||
|
and you are willing to have group memberships remain static
|
||||||
|
for approximately a day, then set skipGroupRefresh to true.
|
||||||
|
\ This is an insecure configuration as authorization policies
|
||||||
|
that are bound to group membership will not notice if a user
|
||||||
|
has been removed from a particular group until their next login.
|
||||||
|
\n This is an experimental feature that may be removed or significantly
|
||||||
|
altered in the future. Consumers of this configuration should
|
||||||
|
carefully read all release notes before upgrading to ensure
|
||||||
|
that the meaning of this field has not changed."
|
||||||
type: boolean
|
type: boolean
|
||||||
required:
|
|
||||||
- skipGroupRefresh
|
|
||||||
type: object
|
type: object
|
||||||
host:
|
host:
|
||||||
description: 'Host is the hostname of this LDAP identity provider,
|
description: 'Host is the hostname of this LDAP identity provider,
|
||||||
|
10
generated/1.17/README.adoc
generated
10
generated/1.17/README.adoc
generated
@ -801,7 +801,10 @@ ActiveDirectoryIdentityProvider describes the configuration of an upstream Micro
|
|||||||
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". Optional, when not specified it will be based on the result of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse). The default behavior searches your entire domain for groups. It may make sense to specify a subtree as a search base if you wish to exclude some groups for security reasons or to make searches faster.
|
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". Optional, when not specified it will be based on the result of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse). The default behavior searches your entire domain for groups. It may make sense to specify a subtree as a search base if you wish to exclude some groups for security reasons or to make searches faster.
|
||||||
| *`filter`* __string__ | Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the filter were specified as "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})". This searches nested groups by default. Note that nested group search can be slow for some Active Directory servers. To disable it, you can set the filter to "(&(objectClass=group)(member={})"
|
| *`filter`* __string__ | Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the filter were specified as "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})". This searches nested groups by default. Note that nested group search can be slow for some Active Directory servers. To disable it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearchattributes[$$ActiveDirectoryIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as the result of the group search.
|
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearchattributes[$$ActiveDirectoryIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as the result of the group search.
|
||||||
| *`skipGroupRefresh`* __boolean__ | SkipGroupRefresh skips the group refresh operation that occurs with each refresh (every 5 minutes). This can be done if group search is very slow or resource intensive for the AD server.
|
| *`skipGroupRefresh`* __boolean__ | The user's group membership is refreshed as they interact with the supervisor to obtain new credentials (as their old credentials expire). This allows group membership changes to be quickly reflected into Kubernetes clusters. Since group membership is often used to bind authorization policies, it is important to keep the groups observed in Kubernetes clusters in-sync with the identity provider.
|
||||||
|
In some environments, frequent group membership queries may result in a significant performance impact on the identity provider and/or the supervisor. The best approach to handle performance impacts is to tweak the group query to be more performant, for example by disabling nested group search or by using a more targeted group search base.
|
||||||
|
If the group search query cannot be made performant and you are willing to have group memberships remain static for approximately a day, then set skipGroupRefresh to true. This is an insecure configuration as authorization policies that are bound to group membership will not notice if a user has been removed from a particular group until their next login.
|
||||||
|
This is an experimental feature that may be removed or significantly altered in the future. Consumers of this configuration should carefully read all release notes before upgrading to ensure that the meaning of this field has not changed.
|
||||||
|===
|
|===
|
||||||
|
|
||||||
|
|
||||||
@ -989,7 +992,10 @@ LDAPIdentityProvider describes the configuration of an upstream Lightweight Dire
|
|||||||
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". When not specified, no group search will be performed and authenticated users will not belong to any groups from the LDAP provider. Also, when not specified, the values of Filter and Attributes are ignored.
|
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". When not specified, no group search will be performed and authenticated users will not belong to any groups from the LDAP provider. Also, when not specified, the values of Filter and Attributes are ignored.
|
||||||
| *`filter`* __string__ | Filter is the LDAP search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about LDAP filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the Filter were specified as "member={}".
|
| *`filter`* __string__ | Filter is the LDAP search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about LDAP filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the Filter were specified as "member={}".
|
||||||
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-ldapidentityprovidergroupsearchattributes[$$LDAPIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each LDAP entry which was found as the result of the group search.
|
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-17-apis-supervisor-idp-v1alpha1-ldapidentityprovidergroupsearchattributes[$$LDAPIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each LDAP entry which was found as the result of the group search.
|
||||||
| *`skipGroupRefresh`* __boolean__ | SkipGroupRefresh skips the group refresh operation that occurs with each refresh (every 5 minutes). This can be done if group search is very slow or resource intensive for the LDAP server.
|
| *`skipGroupRefresh`* __boolean__ | The user's group membership is refreshed as they interact with the supervisor to obtain new credentials (as their old credentials expire). This allows group membership changes to be quickly reflected into Kubernetes clusters. Since group membership is often used to bind authorization policies, it is important to keep the groups observed in Kubernetes clusters in-sync with the identity provider.
|
||||||
|
In some environments, frequent group membership queries may result in a significant performance impact on the identity provider and/or the supervisor. The best approach to handle performance impacts is to tweak the group query to be more performant, for example by disabling nested group search or by using a more targeted group search base.
|
||||||
|
If the group search query cannot be made performant and you are willing to have group memberships remain static for approximately a day, then set skipGroupRefresh to true. This is an insecure configuration as authorization policies that are bound to group membership will not notice if a user has been removed from a particular group until their next login.
|
||||||
|
This is an experimental feature that may be removed or significantly altered in the future. Consumers of this configuration should carefully read all release notes before upgrading to ensure that the meaning of this field has not changed.
|
||||||
|===
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
@ -132,10 +132,30 @@ type ActiveDirectoryIdentityProviderGroupSearch struct {
|
|||||||
// +optional
|
// +optional
|
||||||
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
|
||||||
// SkipGroupRefresh skips the group refresh operation that occurs with each refresh
|
// The user's group membership is refreshed as they interact with the supervisor
|
||||||
// (every 5 minutes). This can be done if group search is very slow or resource intensive for the AD
|
// to obtain new credentials (as their old credentials expire). This allows group
|
||||||
// server.
|
// membership changes to be quickly reflected into Kubernetes clusters. Since
|
||||||
SkipGroupRefresh bool `json:"skipGroupRefresh"`
|
// group membership is often used to bind authorization policies, it is important
|
||||||
|
// to keep the groups observed in Kubernetes clusters in-sync with the identity
|
||||||
|
// provider.
|
||||||
|
//
|
||||||
|
// In some environments, frequent group membership queries may result in a
|
||||||
|
// significant performance impact on the identity provider and/or the supervisor.
|
||||||
|
// The best approach to handle performance impacts is to tweak the group query
|
||||||
|
// to be more performant, for example by disabling nested group search or by
|
||||||
|
// using a more targeted group search base.
|
||||||
|
//
|
||||||
|
// If the group search query cannot be made performant and you are willing to
|
||||||
|
// have group memberships remain static for approximately a day, then set
|
||||||
|
// skipGroupRefresh to true. This is an insecure configuration as authorization
|
||||||
|
// policies that are bound to group membership will not notice if a user has
|
||||||
|
// been removed from a particular group until their next login.
|
||||||
|
//
|
||||||
|
// This is an experimental feature that may be removed or significantly altered
|
||||||
|
// in the future. Consumers of this configuration should carefully read all
|
||||||
|
// release notes before upgrading to ensure that the meaning of this field has
|
||||||
|
// not changed.
|
||||||
|
SkipGroupRefresh bool `json:"skipGroupRefresh,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Spec for configuring an ActiveDirectory identity provider.
|
// Spec for configuring an ActiveDirectory identity provider.
|
||||||
|
@ -120,10 +120,30 @@ type LDAPIdentityProviderGroupSearch struct {
|
|||||||
// +optional
|
// +optional
|
||||||
Attributes LDAPIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
Attributes LDAPIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
|
||||||
// SkipGroupRefresh skips the group refresh operation that occurs with each refresh
|
// The user's group membership is refreshed as they interact with the supervisor
|
||||||
// (every 5 minutes). This can be done if group search is very slow or resource intensive for the LDAP
|
// to obtain new credentials (as their old credentials expire). This allows group
|
||||||
// server.
|
// membership changes to be quickly reflected into Kubernetes clusters. Since
|
||||||
SkipGroupRefresh bool `json:"skipGroupRefresh"`
|
// group membership is often used to bind authorization policies, it is important
|
||||||
|
// to keep the groups observed in Kubernetes clusters in-sync with the identity
|
||||||
|
// provider.
|
||||||
|
//
|
||||||
|
// In some environments, frequent group membership queries may result in a
|
||||||
|
// significant performance impact on the identity provider and/or the supervisor.
|
||||||
|
// The best approach to handle performance impacts is to tweak the group query
|
||||||
|
// to be more performant, for example by disabling nested group search or by
|
||||||
|
// using a more targeted group search base.
|
||||||
|
//
|
||||||
|
// If the group search query cannot be made performant and you are willing to
|
||||||
|
// have group memberships remain static for approximately a day, then set
|
||||||
|
// skipGroupRefresh to true. This is an insecure configuration as authorization
|
||||||
|
// policies that are bound to group membership will not notice if a user has
|
||||||
|
// been removed from a particular group until their next login.
|
||||||
|
//
|
||||||
|
// This is an experimental feature that may be removed or significantly altered
|
||||||
|
// in the future. Consumers of this configuration should carefully read all
|
||||||
|
// release notes before upgrading to ensure that the meaning of this field has
|
||||||
|
// not changed.
|
||||||
|
SkipGroupRefresh bool `json:"skipGroupRefresh,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Spec for configuring an LDAP identity provider.
|
// Spec for configuring an LDAP identity provider.
|
||||||
|
@ -120,13 +120,29 @@ spec:
|
|||||||
it, you can set the filter to "(&(objectClass=group)(member={})"
|
it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
type: string
|
type: string
|
||||||
skipGroupRefresh:
|
skipGroupRefresh:
|
||||||
description: SkipGroupRefresh skips the group refresh operation
|
description: "The user's group membership is refreshed as they
|
||||||
that occurs with each refresh (every 5 minutes). This can be
|
interact with the supervisor to obtain new credentials (as their
|
||||||
done if group search is very slow or resource intensive for
|
old credentials expire). This allows group membership changes
|
||||||
the AD server.
|
to be quickly reflected into Kubernetes clusters. Since group
|
||||||
|
membership is often used to bind authorization policies, it
|
||||||
|
is important to keep the groups observed in Kubernetes clusters
|
||||||
|
in-sync with the identity provider. \n In some environments,
|
||||||
|
frequent group membership queries may result in a significant
|
||||||
|
performance impact on the identity provider and/or the supervisor.
|
||||||
|
The best approach to handle performance impacts is to tweak
|
||||||
|
the group query to be more performant, for example by disabling
|
||||||
|
nested group search or by using a more targeted group search
|
||||||
|
base. \n If the group search query cannot be made performant
|
||||||
|
and you are willing to have group memberships remain static
|
||||||
|
for approximately a day, then set skipGroupRefresh to true.
|
||||||
|
\ This is an insecure configuration as authorization policies
|
||||||
|
that are bound to group membership will not notice if a user
|
||||||
|
has been removed from a particular group until their next login.
|
||||||
|
\n This is an experimental feature that may be removed or significantly
|
||||||
|
altered in the future. Consumers of this configuration should
|
||||||
|
carefully read all release notes before upgrading to ensure
|
||||||
|
that the meaning of this field has not changed."
|
||||||
type: boolean
|
type: boolean
|
||||||
required:
|
|
||||||
- skipGroupRefresh
|
|
||||||
type: object
|
type: object
|
||||||
host:
|
host:
|
||||||
description: 'Host is the hostname of this Active Directory identity
|
description: 'Host is the hostname of this Active Directory identity
|
||||||
|
@ -112,13 +112,29 @@ spec:
|
|||||||
the default will act as if the Filter were specified as "member={}".
|
the default will act as if the Filter were specified as "member={}".
|
||||||
type: string
|
type: string
|
||||||
skipGroupRefresh:
|
skipGroupRefresh:
|
||||||
description: SkipGroupRefresh skips the group refresh operation
|
description: "The user's group membership is refreshed as they
|
||||||
that occurs with each refresh (every 5 minutes). This can be
|
interact with the supervisor to obtain new credentials (as their
|
||||||
done if group search is very slow or resource intensive for
|
old credentials expire). This allows group membership changes
|
||||||
the LDAP server.
|
to be quickly reflected into Kubernetes clusters. Since group
|
||||||
|
membership is often used to bind authorization policies, it
|
||||||
|
is important to keep the groups observed in Kubernetes clusters
|
||||||
|
in-sync with the identity provider. \n In some environments,
|
||||||
|
frequent group membership queries may result in a significant
|
||||||
|
performance impact on the identity provider and/or the supervisor.
|
||||||
|
The best approach to handle performance impacts is to tweak
|
||||||
|
the group query to be more performant, for example by disabling
|
||||||
|
nested group search or by using a more targeted group search
|
||||||
|
base. \n If the group search query cannot be made performant
|
||||||
|
and you are willing to have group memberships remain static
|
||||||
|
for approximately a day, then set skipGroupRefresh to true.
|
||||||
|
\ This is an insecure configuration as authorization policies
|
||||||
|
that are bound to group membership will not notice if a user
|
||||||
|
has been removed from a particular group until their next login.
|
||||||
|
\n This is an experimental feature that may be removed or significantly
|
||||||
|
altered in the future. Consumers of this configuration should
|
||||||
|
carefully read all release notes before upgrading to ensure
|
||||||
|
that the meaning of this field has not changed."
|
||||||
type: boolean
|
type: boolean
|
||||||
required:
|
|
||||||
- skipGroupRefresh
|
|
||||||
type: object
|
type: object
|
||||||
host:
|
host:
|
||||||
description: 'Host is the hostname of this LDAP identity provider,
|
description: 'Host is the hostname of this LDAP identity provider,
|
||||||
|
10
generated/1.18/README.adoc
generated
10
generated/1.18/README.adoc
generated
@ -801,7 +801,10 @@ ActiveDirectoryIdentityProvider describes the configuration of an upstream Micro
|
|||||||
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". Optional, when not specified it will be based on the result of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse). The default behavior searches your entire domain for groups. It may make sense to specify a subtree as a search base if you wish to exclude some groups for security reasons or to make searches faster.
|
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". Optional, when not specified it will be based on the result of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse). The default behavior searches your entire domain for groups. It may make sense to specify a subtree as a search base if you wish to exclude some groups for security reasons or to make searches faster.
|
||||||
| *`filter`* __string__ | Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the filter were specified as "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})". This searches nested groups by default. Note that nested group search can be slow for some Active Directory servers. To disable it, you can set the filter to "(&(objectClass=group)(member={})"
|
| *`filter`* __string__ | Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the filter were specified as "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})". This searches nested groups by default. Note that nested group search can be slow for some Active Directory servers. To disable it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearchattributes[$$ActiveDirectoryIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as the result of the group search.
|
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearchattributes[$$ActiveDirectoryIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as the result of the group search.
|
||||||
| *`skipGroupRefresh`* __boolean__ | SkipGroupRefresh skips the group refresh operation that occurs with each refresh (every 5 minutes). This can be done if group search is very slow or resource intensive for the AD server.
|
| *`skipGroupRefresh`* __boolean__ | The user's group membership is refreshed as they interact with the supervisor to obtain new credentials (as their old credentials expire). This allows group membership changes to be quickly reflected into Kubernetes clusters. Since group membership is often used to bind authorization policies, it is important to keep the groups observed in Kubernetes clusters in-sync with the identity provider.
|
||||||
|
In some environments, frequent group membership queries may result in a significant performance impact on the identity provider and/or the supervisor. The best approach to handle performance impacts is to tweak the group query to be more performant, for example by disabling nested group search or by using a more targeted group search base.
|
||||||
|
If the group search query cannot be made performant and you are willing to have group memberships remain static for approximately a day, then set skipGroupRefresh to true. This is an insecure configuration as authorization policies that are bound to group membership will not notice if a user has been removed from a particular group until their next login.
|
||||||
|
This is an experimental feature that may be removed or significantly altered in the future. Consumers of this configuration should carefully read all release notes before upgrading to ensure that the meaning of this field has not changed.
|
||||||
|===
|
|===
|
||||||
|
|
||||||
|
|
||||||
@ -989,7 +992,10 @@ LDAPIdentityProvider describes the configuration of an upstream Lightweight Dire
|
|||||||
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". When not specified, no group search will be performed and authenticated users will not belong to any groups from the LDAP provider. Also, when not specified, the values of Filter and Attributes are ignored.
|
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". When not specified, no group search will be performed and authenticated users will not belong to any groups from the LDAP provider. Also, when not specified, the values of Filter and Attributes are ignored.
|
||||||
| *`filter`* __string__ | Filter is the LDAP search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about LDAP filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the Filter were specified as "member={}".
|
| *`filter`* __string__ | Filter is the LDAP search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about LDAP filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the Filter were specified as "member={}".
|
||||||
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-ldapidentityprovidergroupsearchattributes[$$LDAPIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each LDAP entry which was found as the result of the group search.
|
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-18-apis-supervisor-idp-v1alpha1-ldapidentityprovidergroupsearchattributes[$$LDAPIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each LDAP entry which was found as the result of the group search.
|
||||||
| *`skipGroupRefresh`* __boolean__ | SkipGroupRefresh skips the group refresh operation that occurs with each refresh (every 5 minutes). This can be done if group search is very slow or resource intensive for the LDAP server.
|
| *`skipGroupRefresh`* __boolean__ | The user's group membership is refreshed as they interact with the supervisor to obtain new credentials (as their old credentials expire). This allows group membership changes to be quickly reflected into Kubernetes clusters. Since group membership is often used to bind authorization policies, it is important to keep the groups observed in Kubernetes clusters in-sync with the identity provider.
|
||||||
|
In some environments, frequent group membership queries may result in a significant performance impact on the identity provider and/or the supervisor. The best approach to handle performance impacts is to tweak the group query to be more performant, for example by disabling nested group search or by using a more targeted group search base.
|
||||||
|
If the group search query cannot be made performant and you are willing to have group memberships remain static for approximately a day, then set skipGroupRefresh to true. This is an insecure configuration as authorization policies that are bound to group membership will not notice if a user has been removed from a particular group until their next login.
|
||||||
|
This is an experimental feature that may be removed or significantly altered in the future. Consumers of this configuration should carefully read all release notes before upgrading to ensure that the meaning of this field has not changed.
|
||||||
|===
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
@ -132,10 +132,30 @@ type ActiveDirectoryIdentityProviderGroupSearch struct {
|
|||||||
// +optional
|
// +optional
|
||||||
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
|
||||||
// SkipGroupRefresh skips the group refresh operation that occurs with each refresh
|
// The user's group membership is refreshed as they interact with the supervisor
|
||||||
// (every 5 minutes). This can be done if group search is very slow or resource intensive for the AD
|
// to obtain new credentials (as their old credentials expire). This allows group
|
||||||
// server.
|
// membership changes to be quickly reflected into Kubernetes clusters. Since
|
||||||
SkipGroupRefresh bool `json:"skipGroupRefresh"`
|
// group membership is often used to bind authorization policies, it is important
|
||||||
|
// to keep the groups observed in Kubernetes clusters in-sync with the identity
|
||||||
|
// provider.
|
||||||
|
//
|
||||||
|
// In some environments, frequent group membership queries may result in a
|
||||||
|
// significant performance impact on the identity provider and/or the supervisor.
|
||||||
|
// The best approach to handle performance impacts is to tweak the group query
|
||||||
|
// to be more performant, for example by disabling nested group search or by
|
||||||
|
// using a more targeted group search base.
|
||||||
|
//
|
||||||
|
// If the group search query cannot be made performant and you are willing to
|
||||||
|
// have group memberships remain static for approximately a day, then set
|
||||||
|
// skipGroupRefresh to true. This is an insecure configuration as authorization
|
||||||
|
// policies that are bound to group membership will not notice if a user has
|
||||||
|
// been removed from a particular group until their next login.
|
||||||
|
//
|
||||||
|
// This is an experimental feature that may be removed or significantly altered
|
||||||
|
// in the future. Consumers of this configuration should carefully read all
|
||||||
|
// release notes before upgrading to ensure that the meaning of this field has
|
||||||
|
// not changed.
|
||||||
|
SkipGroupRefresh bool `json:"skipGroupRefresh,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Spec for configuring an ActiveDirectory identity provider.
|
// Spec for configuring an ActiveDirectory identity provider.
|
||||||
|
@ -120,10 +120,30 @@ type LDAPIdentityProviderGroupSearch struct {
|
|||||||
// +optional
|
// +optional
|
||||||
Attributes LDAPIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
Attributes LDAPIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
|
||||||
// SkipGroupRefresh skips the group refresh operation that occurs with each refresh
|
// The user's group membership is refreshed as they interact with the supervisor
|
||||||
// (every 5 minutes). This can be done if group search is very slow or resource intensive for the LDAP
|
// to obtain new credentials (as their old credentials expire). This allows group
|
||||||
// server.
|
// membership changes to be quickly reflected into Kubernetes clusters. Since
|
||||||
SkipGroupRefresh bool `json:"skipGroupRefresh"`
|
// group membership is often used to bind authorization policies, it is important
|
||||||
|
// to keep the groups observed in Kubernetes clusters in-sync with the identity
|
||||||
|
// provider.
|
||||||
|
//
|
||||||
|
// In some environments, frequent group membership queries may result in a
|
||||||
|
// significant performance impact on the identity provider and/or the supervisor.
|
||||||
|
// The best approach to handle performance impacts is to tweak the group query
|
||||||
|
// to be more performant, for example by disabling nested group search or by
|
||||||
|
// using a more targeted group search base.
|
||||||
|
//
|
||||||
|
// If the group search query cannot be made performant and you are willing to
|
||||||
|
// have group memberships remain static for approximately a day, then set
|
||||||
|
// skipGroupRefresh to true. This is an insecure configuration as authorization
|
||||||
|
// policies that are bound to group membership will not notice if a user has
|
||||||
|
// been removed from a particular group until their next login.
|
||||||
|
//
|
||||||
|
// This is an experimental feature that may be removed or significantly altered
|
||||||
|
// in the future. Consumers of this configuration should carefully read all
|
||||||
|
// release notes before upgrading to ensure that the meaning of this field has
|
||||||
|
// not changed.
|
||||||
|
SkipGroupRefresh bool `json:"skipGroupRefresh,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Spec for configuring an LDAP identity provider.
|
// Spec for configuring an LDAP identity provider.
|
||||||
|
@ -120,13 +120,29 @@ spec:
|
|||||||
it, you can set the filter to "(&(objectClass=group)(member={})"
|
it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
type: string
|
type: string
|
||||||
skipGroupRefresh:
|
skipGroupRefresh:
|
||||||
description: SkipGroupRefresh skips the group refresh operation
|
description: "The user's group membership is refreshed as they
|
||||||
that occurs with each refresh (every 5 minutes). This can be
|
interact with the supervisor to obtain new credentials (as their
|
||||||
done if group search is very slow or resource intensive for
|
old credentials expire). This allows group membership changes
|
||||||
the AD server.
|
to be quickly reflected into Kubernetes clusters. Since group
|
||||||
|
membership is often used to bind authorization policies, it
|
||||||
|
is important to keep the groups observed in Kubernetes clusters
|
||||||
|
in-sync with the identity provider. \n In some environments,
|
||||||
|
frequent group membership queries may result in a significant
|
||||||
|
performance impact on the identity provider and/or the supervisor.
|
||||||
|
The best approach to handle performance impacts is to tweak
|
||||||
|
the group query to be more performant, for example by disabling
|
||||||
|
nested group search or by using a more targeted group search
|
||||||
|
base. \n If the group search query cannot be made performant
|
||||||
|
and you are willing to have group memberships remain static
|
||||||
|
for approximately a day, then set skipGroupRefresh to true.
|
||||||
|
\ This is an insecure configuration as authorization policies
|
||||||
|
that are bound to group membership will not notice if a user
|
||||||
|
has been removed from a particular group until their next login.
|
||||||
|
\n This is an experimental feature that may be removed or significantly
|
||||||
|
altered in the future. Consumers of this configuration should
|
||||||
|
carefully read all release notes before upgrading to ensure
|
||||||
|
that the meaning of this field has not changed."
|
||||||
type: boolean
|
type: boolean
|
||||||
required:
|
|
||||||
- skipGroupRefresh
|
|
||||||
type: object
|
type: object
|
||||||
host:
|
host:
|
||||||
description: 'Host is the hostname of this Active Directory identity
|
description: 'Host is the hostname of this Active Directory identity
|
||||||
|
@ -112,13 +112,29 @@ spec:
|
|||||||
the default will act as if the Filter were specified as "member={}".
|
the default will act as if the Filter were specified as "member={}".
|
||||||
type: string
|
type: string
|
||||||
skipGroupRefresh:
|
skipGroupRefresh:
|
||||||
description: SkipGroupRefresh skips the group refresh operation
|
description: "The user's group membership is refreshed as they
|
||||||
that occurs with each refresh (every 5 minutes). This can be
|
interact with the supervisor to obtain new credentials (as their
|
||||||
done if group search is very slow or resource intensive for
|
old credentials expire). This allows group membership changes
|
||||||
the LDAP server.
|
to be quickly reflected into Kubernetes clusters. Since group
|
||||||
|
membership is often used to bind authorization policies, it
|
||||||
|
is important to keep the groups observed in Kubernetes clusters
|
||||||
|
in-sync with the identity provider. \n In some environments,
|
||||||
|
frequent group membership queries may result in a significant
|
||||||
|
performance impact on the identity provider and/or the supervisor.
|
||||||
|
The best approach to handle performance impacts is to tweak
|
||||||
|
the group query to be more performant, for example by disabling
|
||||||
|
nested group search or by using a more targeted group search
|
||||||
|
base. \n If the group search query cannot be made performant
|
||||||
|
and you are willing to have group memberships remain static
|
||||||
|
for approximately a day, then set skipGroupRefresh to true.
|
||||||
|
\ This is an insecure configuration as authorization policies
|
||||||
|
that are bound to group membership will not notice if a user
|
||||||
|
has been removed from a particular group until their next login.
|
||||||
|
\n This is an experimental feature that may be removed or significantly
|
||||||
|
altered in the future. Consumers of this configuration should
|
||||||
|
carefully read all release notes before upgrading to ensure
|
||||||
|
that the meaning of this field has not changed."
|
||||||
type: boolean
|
type: boolean
|
||||||
required:
|
|
||||||
- skipGroupRefresh
|
|
||||||
type: object
|
type: object
|
||||||
host:
|
host:
|
||||||
description: 'Host is the hostname of this LDAP identity provider,
|
description: 'Host is the hostname of this LDAP identity provider,
|
||||||
|
10
generated/1.19/README.adoc
generated
10
generated/1.19/README.adoc
generated
@ -801,7 +801,10 @@ ActiveDirectoryIdentityProvider describes the configuration of an upstream Micro
|
|||||||
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". Optional, when not specified it will be based on the result of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse). The default behavior searches your entire domain for groups. It may make sense to specify a subtree as a search base if you wish to exclude some groups for security reasons or to make searches faster.
|
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". Optional, when not specified it will be based on the result of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse). The default behavior searches your entire domain for groups. It may make sense to specify a subtree as a search base if you wish to exclude some groups for security reasons or to make searches faster.
|
||||||
| *`filter`* __string__ | Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the filter were specified as "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})". This searches nested groups by default. Note that nested group search can be slow for some Active Directory servers. To disable it, you can set the filter to "(&(objectClass=group)(member={})"
|
| *`filter`* __string__ | Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the filter were specified as "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})". This searches nested groups by default. Note that nested group search can be slow for some Active Directory servers. To disable it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearchattributes[$$ActiveDirectoryIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as the result of the group search.
|
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearchattributes[$$ActiveDirectoryIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as the result of the group search.
|
||||||
| *`skipGroupRefresh`* __boolean__ | SkipGroupRefresh skips the group refresh operation that occurs with each refresh (every 5 minutes). This can be done if group search is very slow or resource intensive for the AD server.
|
| *`skipGroupRefresh`* __boolean__ | The user's group membership is refreshed as they interact with the supervisor to obtain new credentials (as their old credentials expire). This allows group membership changes to be quickly reflected into Kubernetes clusters. Since group membership is often used to bind authorization policies, it is important to keep the groups observed in Kubernetes clusters in-sync with the identity provider.
|
||||||
|
In some environments, frequent group membership queries may result in a significant performance impact on the identity provider and/or the supervisor. The best approach to handle performance impacts is to tweak the group query to be more performant, for example by disabling nested group search or by using a more targeted group search base.
|
||||||
|
If the group search query cannot be made performant and you are willing to have group memberships remain static for approximately a day, then set skipGroupRefresh to true. This is an insecure configuration as authorization policies that are bound to group membership will not notice if a user has been removed from a particular group until their next login.
|
||||||
|
This is an experimental feature that may be removed or significantly altered in the future. Consumers of this configuration should carefully read all release notes before upgrading to ensure that the meaning of this field has not changed.
|
||||||
|===
|
|===
|
||||||
|
|
||||||
|
|
||||||
@ -989,7 +992,10 @@ LDAPIdentityProvider describes the configuration of an upstream Lightweight Dire
|
|||||||
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". When not specified, no group search will be performed and authenticated users will not belong to any groups from the LDAP provider. Also, when not specified, the values of Filter and Attributes are ignored.
|
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". When not specified, no group search will be performed and authenticated users will not belong to any groups from the LDAP provider. Also, when not specified, the values of Filter and Attributes are ignored.
|
||||||
| *`filter`* __string__ | Filter is the LDAP search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about LDAP filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the Filter were specified as "member={}".
|
| *`filter`* __string__ | Filter is the LDAP search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about LDAP filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the Filter were specified as "member={}".
|
||||||
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-ldapidentityprovidergroupsearchattributes[$$LDAPIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each LDAP entry which was found as the result of the group search.
|
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-19-apis-supervisor-idp-v1alpha1-ldapidentityprovidergroupsearchattributes[$$LDAPIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each LDAP entry which was found as the result of the group search.
|
||||||
| *`skipGroupRefresh`* __boolean__ | SkipGroupRefresh skips the group refresh operation that occurs with each refresh (every 5 minutes). This can be done if group search is very slow or resource intensive for the LDAP server.
|
| *`skipGroupRefresh`* __boolean__ | The user's group membership is refreshed as they interact with the supervisor to obtain new credentials (as their old credentials expire). This allows group membership changes to be quickly reflected into Kubernetes clusters. Since group membership is often used to bind authorization policies, it is important to keep the groups observed in Kubernetes clusters in-sync with the identity provider.
|
||||||
|
In some environments, frequent group membership queries may result in a significant performance impact on the identity provider and/or the supervisor. The best approach to handle performance impacts is to tweak the group query to be more performant, for example by disabling nested group search or by using a more targeted group search base.
|
||||||
|
If the group search query cannot be made performant and you are willing to have group memberships remain static for approximately a day, then set skipGroupRefresh to true. This is an insecure configuration as authorization policies that are bound to group membership will not notice if a user has been removed from a particular group until their next login.
|
||||||
|
This is an experimental feature that may be removed or significantly altered in the future. Consumers of this configuration should carefully read all release notes before upgrading to ensure that the meaning of this field has not changed.
|
||||||
|===
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
@ -132,10 +132,30 @@ type ActiveDirectoryIdentityProviderGroupSearch struct {
|
|||||||
// +optional
|
// +optional
|
||||||
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
|
||||||
// SkipGroupRefresh skips the group refresh operation that occurs with each refresh
|
// The user's group membership is refreshed as they interact with the supervisor
|
||||||
// (every 5 minutes). This can be done if group search is very slow or resource intensive for the AD
|
// to obtain new credentials (as their old credentials expire). This allows group
|
||||||
// server.
|
// membership changes to be quickly reflected into Kubernetes clusters. Since
|
||||||
SkipGroupRefresh bool `json:"skipGroupRefresh"`
|
// group membership is often used to bind authorization policies, it is important
|
||||||
|
// to keep the groups observed in Kubernetes clusters in-sync with the identity
|
||||||
|
// provider.
|
||||||
|
//
|
||||||
|
// In some environments, frequent group membership queries may result in a
|
||||||
|
// significant performance impact on the identity provider and/or the supervisor.
|
||||||
|
// The best approach to handle performance impacts is to tweak the group query
|
||||||
|
// to be more performant, for example by disabling nested group search or by
|
||||||
|
// using a more targeted group search base.
|
||||||
|
//
|
||||||
|
// If the group search query cannot be made performant and you are willing to
|
||||||
|
// have group memberships remain static for approximately a day, then set
|
||||||
|
// skipGroupRefresh to true. This is an insecure configuration as authorization
|
||||||
|
// policies that are bound to group membership will not notice if a user has
|
||||||
|
// been removed from a particular group until their next login.
|
||||||
|
//
|
||||||
|
// This is an experimental feature that may be removed or significantly altered
|
||||||
|
// in the future. Consumers of this configuration should carefully read all
|
||||||
|
// release notes before upgrading to ensure that the meaning of this field has
|
||||||
|
// not changed.
|
||||||
|
SkipGroupRefresh bool `json:"skipGroupRefresh,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Spec for configuring an ActiveDirectory identity provider.
|
// Spec for configuring an ActiveDirectory identity provider.
|
||||||
|
@ -120,10 +120,30 @@ type LDAPIdentityProviderGroupSearch struct {
|
|||||||
// +optional
|
// +optional
|
||||||
Attributes LDAPIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
Attributes LDAPIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
|
||||||
// SkipGroupRefresh skips the group refresh operation that occurs with each refresh
|
// The user's group membership is refreshed as they interact with the supervisor
|
||||||
// (every 5 minutes). This can be done if group search is very slow or resource intensive for the LDAP
|
// to obtain new credentials (as their old credentials expire). This allows group
|
||||||
// server.
|
// membership changes to be quickly reflected into Kubernetes clusters. Since
|
||||||
SkipGroupRefresh bool `json:"skipGroupRefresh"`
|
// group membership is often used to bind authorization policies, it is important
|
||||||
|
// to keep the groups observed in Kubernetes clusters in-sync with the identity
|
||||||
|
// provider.
|
||||||
|
//
|
||||||
|
// In some environments, frequent group membership queries may result in a
|
||||||
|
// significant performance impact on the identity provider and/or the supervisor.
|
||||||
|
// The best approach to handle performance impacts is to tweak the group query
|
||||||
|
// to be more performant, for example by disabling nested group search or by
|
||||||
|
// using a more targeted group search base.
|
||||||
|
//
|
||||||
|
// If the group search query cannot be made performant and you are willing to
|
||||||
|
// have group memberships remain static for approximately a day, then set
|
||||||
|
// skipGroupRefresh to true. This is an insecure configuration as authorization
|
||||||
|
// policies that are bound to group membership will not notice if a user has
|
||||||
|
// been removed from a particular group until their next login.
|
||||||
|
//
|
||||||
|
// This is an experimental feature that may be removed or significantly altered
|
||||||
|
// in the future. Consumers of this configuration should carefully read all
|
||||||
|
// release notes before upgrading to ensure that the meaning of this field has
|
||||||
|
// not changed.
|
||||||
|
SkipGroupRefresh bool `json:"skipGroupRefresh,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Spec for configuring an LDAP identity provider.
|
// Spec for configuring an LDAP identity provider.
|
||||||
|
@ -120,13 +120,29 @@ spec:
|
|||||||
it, you can set the filter to "(&(objectClass=group)(member={})"
|
it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
type: string
|
type: string
|
||||||
skipGroupRefresh:
|
skipGroupRefresh:
|
||||||
description: SkipGroupRefresh skips the group refresh operation
|
description: "The user's group membership is refreshed as they
|
||||||
that occurs with each refresh (every 5 minutes). This can be
|
interact with the supervisor to obtain new credentials (as their
|
||||||
done if group search is very slow or resource intensive for
|
old credentials expire). This allows group membership changes
|
||||||
the AD server.
|
to be quickly reflected into Kubernetes clusters. Since group
|
||||||
|
membership is often used to bind authorization policies, it
|
||||||
|
is important to keep the groups observed in Kubernetes clusters
|
||||||
|
in-sync with the identity provider. \n In some environments,
|
||||||
|
frequent group membership queries may result in a significant
|
||||||
|
performance impact on the identity provider and/or the supervisor.
|
||||||
|
The best approach to handle performance impacts is to tweak
|
||||||
|
the group query to be more performant, for example by disabling
|
||||||
|
nested group search or by using a more targeted group search
|
||||||
|
base. \n If the group search query cannot be made performant
|
||||||
|
and you are willing to have group memberships remain static
|
||||||
|
for approximately a day, then set skipGroupRefresh to true.
|
||||||
|
\ This is an insecure configuration as authorization policies
|
||||||
|
that are bound to group membership will not notice if a user
|
||||||
|
has been removed from a particular group until their next login.
|
||||||
|
\n This is an experimental feature that may be removed or significantly
|
||||||
|
altered in the future. Consumers of this configuration should
|
||||||
|
carefully read all release notes before upgrading to ensure
|
||||||
|
that the meaning of this field has not changed."
|
||||||
type: boolean
|
type: boolean
|
||||||
required:
|
|
||||||
- skipGroupRefresh
|
|
||||||
type: object
|
type: object
|
||||||
host:
|
host:
|
||||||
description: 'Host is the hostname of this Active Directory identity
|
description: 'Host is the hostname of this Active Directory identity
|
||||||
|
@ -112,13 +112,29 @@ spec:
|
|||||||
the default will act as if the Filter were specified as "member={}".
|
the default will act as if the Filter were specified as "member={}".
|
||||||
type: string
|
type: string
|
||||||
skipGroupRefresh:
|
skipGroupRefresh:
|
||||||
description: SkipGroupRefresh skips the group refresh operation
|
description: "The user's group membership is refreshed as they
|
||||||
that occurs with each refresh (every 5 minutes). This can be
|
interact with the supervisor to obtain new credentials (as their
|
||||||
done if group search is very slow or resource intensive for
|
old credentials expire). This allows group membership changes
|
||||||
the LDAP server.
|
to be quickly reflected into Kubernetes clusters. Since group
|
||||||
|
membership is often used to bind authorization policies, it
|
||||||
|
is important to keep the groups observed in Kubernetes clusters
|
||||||
|
in-sync with the identity provider. \n In some environments,
|
||||||
|
frequent group membership queries may result in a significant
|
||||||
|
performance impact on the identity provider and/or the supervisor.
|
||||||
|
The best approach to handle performance impacts is to tweak
|
||||||
|
the group query to be more performant, for example by disabling
|
||||||
|
nested group search or by using a more targeted group search
|
||||||
|
base. \n If the group search query cannot be made performant
|
||||||
|
and you are willing to have group memberships remain static
|
||||||
|
for approximately a day, then set skipGroupRefresh to true.
|
||||||
|
\ This is an insecure configuration as authorization policies
|
||||||
|
that are bound to group membership will not notice if a user
|
||||||
|
has been removed from a particular group until their next login.
|
||||||
|
\n This is an experimental feature that may be removed or significantly
|
||||||
|
altered in the future. Consumers of this configuration should
|
||||||
|
carefully read all release notes before upgrading to ensure
|
||||||
|
that the meaning of this field has not changed."
|
||||||
type: boolean
|
type: boolean
|
||||||
required:
|
|
||||||
- skipGroupRefresh
|
|
||||||
type: object
|
type: object
|
||||||
host:
|
host:
|
||||||
description: 'Host is the hostname of this LDAP identity provider,
|
description: 'Host is the hostname of this LDAP identity provider,
|
||||||
|
10
generated/1.20/README.adoc
generated
10
generated/1.20/README.adoc
generated
@ -801,7 +801,10 @@ ActiveDirectoryIdentityProvider describes the configuration of an upstream Micro
|
|||||||
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". Optional, when not specified it will be based on the result of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse). The default behavior searches your entire domain for groups. It may make sense to specify a subtree as a search base if you wish to exclude some groups for security reasons or to make searches faster.
|
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". Optional, when not specified it will be based on the result of a query for the defaultNamingContext (see https://docs.microsoft.com/en-us/windows/win32/adschema/rootdse). The default behavior searches your entire domain for groups. It may make sense to specify a subtree as a search base if you wish to exclude some groups for security reasons or to make searches faster.
|
||||||
| *`filter`* __string__ | Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the filter were specified as "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})". This searches nested groups by default. Note that nested group search can be slow for some Active Directory servers. To disable it, you can set the filter to "(&(objectClass=group)(member={})"
|
| *`filter`* __string__ | Filter is the ActiveDirectory search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about ActiveDirectory filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the filter were specified as "(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={})". This searches nested groups by default. Note that nested group search can be slow for some Active Directory servers. To disable it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearchattributes[$$ActiveDirectoryIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as the result of the group search.
|
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-activedirectoryidentityprovidergroupsearchattributes[$$ActiveDirectoryIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each ActiveDirectory entry which was found as the result of the group search.
|
||||||
| *`skipGroupRefresh`* __boolean__ | SkipGroupRefresh skips the group refresh operation that occurs with each refresh (every 5 minutes). This can be done if group search is very slow or resource intensive for the AD server.
|
| *`skipGroupRefresh`* __boolean__ | The user's group membership is refreshed as they interact with the supervisor to obtain new credentials (as their old credentials expire). This allows group membership changes to be quickly reflected into Kubernetes clusters. Since group membership is often used to bind authorization policies, it is important to keep the groups observed in Kubernetes clusters in-sync with the identity provider.
|
||||||
|
In some environments, frequent group membership queries may result in a significant performance impact on the identity provider and/or the supervisor. The best approach to handle performance impacts is to tweak the group query to be more performant, for example by disabling nested group search or by using a more targeted group search base.
|
||||||
|
If the group search query cannot be made performant and you are willing to have group memberships remain static for approximately a day, then set skipGroupRefresh to true. This is an insecure configuration as authorization policies that are bound to group membership will not notice if a user has been removed from a particular group until their next login.
|
||||||
|
This is an experimental feature that may be removed or significantly altered in the future. Consumers of this configuration should carefully read all release notes before upgrading to ensure that the meaning of this field has not changed.
|
||||||
|===
|
|===
|
||||||
|
|
||||||
|
|
||||||
@ -989,7 +992,10 @@ LDAPIdentityProvider describes the configuration of an upstream Lightweight Dire
|
|||||||
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". When not specified, no group search will be performed and authenticated users will not belong to any groups from the LDAP provider. Also, when not specified, the values of Filter and Attributes are ignored.
|
| *`base`* __string__ | Base is the dn (distinguished name) that should be used as the search base when searching for groups. E.g. "ou=groups,dc=example,dc=com". When not specified, no group search will be performed and authenticated users will not belong to any groups from the LDAP provider. Also, when not specified, the values of Filter and Attributes are ignored.
|
||||||
| *`filter`* __string__ | Filter is the LDAP search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about LDAP filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the Filter were specified as "member={}".
|
| *`filter`* __string__ | Filter is the LDAP search filter which should be applied when searching for groups for a user. The pattern "{}" must occur in the filter at least once and will be dynamically replaced by the dn (distinguished name) of the user entry found as a result of the user search. E.g. "member={}" or "&(objectClass=groupOfNames)(member={})". For more information about LDAP filters, see https://ldap.com/ldap-filters. Note that the dn (distinguished name) is not an attribute of an entry, so "dn={}" cannot be used. Optional. When not specified, the default will act as if the Filter were specified as "member={}".
|
||||||
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-ldapidentityprovidergroupsearchattributes[$$LDAPIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each LDAP entry which was found as the result of the group search.
|
| *`attributes`* __xref:{anchor_prefix}-go-pinniped-dev-generated-1-20-apis-supervisor-idp-v1alpha1-ldapidentityprovidergroupsearchattributes[$$LDAPIdentityProviderGroupSearchAttributes$$]__ | Attributes specifies how the group's information should be read from each LDAP entry which was found as the result of the group search.
|
||||||
| *`skipGroupRefresh`* __boolean__ | SkipGroupRefresh skips the group refresh operation that occurs with each refresh (every 5 minutes). This can be done if group search is very slow or resource intensive for the LDAP server.
|
| *`skipGroupRefresh`* __boolean__ | The user's group membership is refreshed as they interact with the supervisor to obtain new credentials (as their old credentials expire). This allows group membership changes to be quickly reflected into Kubernetes clusters. Since group membership is often used to bind authorization policies, it is important to keep the groups observed in Kubernetes clusters in-sync with the identity provider.
|
||||||
|
In some environments, frequent group membership queries may result in a significant performance impact on the identity provider and/or the supervisor. The best approach to handle performance impacts is to tweak the group query to be more performant, for example by disabling nested group search or by using a more targeted group search base.
|
||||||
|
If the group search query cannot be made performant and you are willing to have group memberships remain static for approximately a day, then set skipGroupRefresh to true. This is an insecure configuration as authorization policies that are bound to group membership will not notice if a user has been removed from a particular group until their next login.
|
||||||
|
This is an experimental feature that may be removed or significantly altered in the future. Consumers of this configuration should carefully read all release notes before upgrading to ensure that the meaning of this field has not changed.
|
||||||
|===
|
|===
|
||||||
|
|
||||||
|
|
||||||
|
@ -132,10 +132,30 @@ type ActiveDirectoryIdentityProviderGroupSearch struct {
|
|||||||
// +optional
|
// +optional
|
||||||
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
|
||||||
// SkipGroupRefresh skips the group refresh operation that occurs with each refresh
|
// The user's group membership is refreshed as they interact with the supervisor
|
||||||
// (every 5 minutes). This can be done if group search is very slow or resource intensive for the AD
|
// to obtain new credentials (as their old credentials expire). This allows group
|
||||||
// server.
|
// membership changes to be quickly reflected into Kubernetes clusters. Since
|
||||||
SkipGroupRefresh bool `json:"skipGroupRefresh"`
|
// group membership is often used to bind authorization policies, it is important
|
||||||
|
// to keep the groups observed in Kubernetes clusters in-sync with the identity
|
||||||
|
// provider.
|
||||||
|
//
|
||||||
|
// In some environments, frequent group membership queries may result in a
|
||||||
|
// significant performance impact on the identity provider and/or the supervisor.
|
||||||
|
// The best approach to handle performance impacts is to tweak the group query
|
||||||
|
// to be more performant, for example by disabling nested group search or by
|
||||||
|
// using a more targeted group search base.
|
||||||
|
//
|
||||||
|
// If the group search query cannot be made performant and you are willing to
|
||||||
|
// have group memberships remain static for approximately a day, then set
|
||||||
|
// skipGroupRefresh to true. This is an insecure configuration as authorization
|
||||||
|
// policies that are bound to group membership will not notice if a user has
|
||||||
|
// been removed from a particular group until their next login.
|
||||||
|
//
|
||||||
|
// This is an experimental feature that may be removed or significantly altered
|
||||||
|
// in the future. Consumers of this configuration should carefully read all
|
||||||
|
// release notes before upgrading to ensure that the meaning of this field has
|
||||||
|
// not changed.
|
||||||
|
SkipGroupRefresh bool `json:"skipGroupRefresh,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Spec for configuring an ActiveDirectory identity provider.
|
// Spec for configuring an ActiveDirectory identity provider.
|
||||||
|
@ -120,10 +120,30 @@ type LDAPIdentityProviderGroupSearch struct {
|
|||||||
// +optional
|
// +optional
|
||||||
Attributes LDAPIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
Attributes LDAPIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
|
||||||
// SkipGroupRefresh skips the group refresh operation that occurs with each refresh
|
// The user's group membership is refreshed as they interact with the supervisor
|
||||||
// (every 5 minutes). This can be done if group search is very slow or resource intensive for the LDAP
|
// to obtain new credentials (as their old credentials expire). This allows group
|
||||||
// server.
|
// membership changes to be quickly reflected into Kubernetes clusters. Since
|
||||||
SkipGroupRefresh bool `json:"skipGroupRefresh"`
|
// group membership is often used to bind authorization policies, it is important
|
||||||
|
// to keep the groups observed in Kubernetes clusters in-sync with the identity
|
||||||
|
// provider.
|
||||||
|
//
|
||||||
|
// In some environments, frequent group membership queries may result in a
|
||||||
|
// significant performance impact on the identity provider and/or the supervisor.
|
||||||
|
// The best approach to handle performance impacts is to tweak the group query
|
||||||
|
// to be more performant, for example by disabling nested group search or by
|
||||||
|
// using a more targeted group search base.
|
||||||
|
//
|
||||||
|
// If the group search query cannot be made performant and you are willing to
|
||||||
|
// have group memberships remain static for approximately a day, then set
|
||||||
|
// skipGroupRefresh to true. This is an insecure configuration as authorization
|
||||||
|
// policies that are bound to group membership will not notice if a user has
|
||||||
|
// been removed from a particular group until their next login.
|
||||||
|
//
|
||||||
|
// This is an experimental feature that may be removed or significantly altered
|
||||||
|
// in the future. Consumers of this configuration should carefully read all
|
||||||
|
// release notes before upgrading to ensure that the meaning of this field has
|
||||||
|
// not changed.
|
||||||
|
SkipGroupRefresh bool `json:"skipGroupRefresh,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Spec for configuring an LDAP identity provider.
|
// Spec for configuring an LDAP identity provider.
|
||||||
|
@ -120,13 +120,29 @@ spec:
|
|||||||
it, you can set the filter to "(&(objectClass=group)(member={})"
|
it, you can set the filter to "(&(objectClass=group)(member={})"
|
||||||
type: string
|
type: string
|
||||||
skipGroupRefresh:
|
skipGroupRefresh:
|
||||||
description: SkipGroupRefresh skips the group refresh operation
|
description: "The user's group membership is refreshed as they
|
||||||
that occurs with each refresh (every 5 minutes). This can be
|
interact with the supervisor to obtain new credentials (as their
|
||||||
done if group search is very slow or resource intensive for
|
old credentials expire). This allows group membership changes
|
||||||
the AD server.
|
to be quickly reflected into Kubernetes clusters. Since group
|
||||||
|
membership is often used to bind authorization policies, it
|
||||||
|
is important to keep the groups observed in Kubernetes clusters
|
||||||
|
in-sync with the identity provider. \n In some environments,
|
||||||
|
frequent group membership queries may result in a significant
|
||||||
|
performance impact on the identity provider and/or the supervisor.
|
||||||
|
The best approach to handle performance impacts is to tweak
|
||||||
|
the group query to be more performant, for example by disabling
|
||||||
|
nested group search or by using a more targeted group search
|
||||||
|
base. \n If the group search query cannot be made performant
|
||||||
|
and you are willing to have group memberships remain static
|
||||||
|
for approximately a day, then set skipGroupRefresh to true.
|
||||||
|
\ This is an insecure configuration as authorization policies
|
||||||
|
that are bound to group membership will not notice if a user
|
||||||
|
has been removed from a particular group until their next login.
|
||||||
|
\n This is an experimental feature that may be removed or significantly
|
||||||
|
altered in the future. Consumers of this configuration should
|
||||||
|
carefully read all release notes before upgrading to ensure
|
||||||
|
that the meaning of this field has not changed."
|
||||||
type: boolean
|
type: boolean
|
||||||
required:
|
|
||||||
- skipGroupRefresh
|
|
||||||
type: object
|
type: object
|
||||||
host:
|
host:
|
||||||
description: 'Host is the hostname of this Active Directory identity
|
description: 'Host is the hostname of this Active Directory identity
|
||||||
|
@ -112,13 +112,29 @@ spec:
|
|||||||
the default will act as if the Filter were specified as "member={}".
|
the default will act as if the Filter were specified as "member={}".
|
||||||
type: string
|
type: string
|
||||||
skipGroupRefresh:
|
skipGroupRefresh:
|
||||||
description: SkipGroupRefresh skips the group refresh operation
|
description: "The user's group membership is refreshed as they
|
||||||
that occurs with each refresh (every 5 minutes). This can be
|
interact with the supervisor to obtain new credentials (as their
|
||||||
done if group search is very slow or resource intensive for
|
old credentials expire). This allows group membership changes
|
||||||
the LDAP server.
|
to be quickly reflected into Kubernetes clusters. Since group
|
||||||
|
membership is often used to bind authorization policies, it
|
||||||
|
is important to keep the groups observed in Kubernetes clusters
|
||||||
|
in-sync with the identity provider. \n In some environments,
|
||||||
|
frequent group membership queries may result in a significant
|
||||||
|
performance impact on the identity provider and/or the supervisor.
|
||||||
|
The best approach to handle performance impacts is to tweak
|
||||||
|
the group query to be more performant, for example by disabling
|
||||||
|
nested group search or by using a more targeted group search
|
||||||
|
base. \n If the group search query cannot be made performant
|
||||||
|
and you are willing to have group memberships remain static
|
||||||
|
for approximately a day, then set skipGroupRefresh to true.
|
||||||
|
\ This is an insecure configuration as authorization policies
|
||||||
|
that are bound to group membership will not notice if a user
|
||||||
|
has been removed from a particular group until their next login.
|
||||||
|
\n This is an experimental feature that may be removed or significantly
|
||||||
|
altered in the future. Consumers of this configuration should
|
||||||
|
carefully read all release notes before upgrading to ensure
|
||||||
|
that the meaning of this field has not changed."
|
||||||
type: boolean
|
type: boolean
|
||||||
required:
|
|
||||||
- skipGroupRefresh
|
|
||||||
type: object
|
type: object
|
||||||
host:
|
host:
|
||||||
description: 'Host is the hostname of this LDAP identity provider,
|
description: 'Host is the hostname of this LDAP identity provider,
|
||||||
|
@ -132,10 +132,30 @@ type ActiveDirectoryIdentityProviderGroupSearch struct {
|
|||||||
// +optional
|
// +optional
|
||||||
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
Attributes ActiveDirectoryIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
|
||||||
// SkipGroupRefresh skips the group refresh operation that occurs with each refresh
|
// The user's group membership is refreshed as they interact with the supervisor
|
||||||
// (every 5 minutes). This can be done if group search is very slow or resource intensive for the AD
|
// to obtain new credentials (as their old credentials expire). This allows group
|
||||||
// server.
|
// membership changes to be quickly reflected into Kubernetes clusters. Since
|
||||||
SkipGroupRefresh bool `json:"skipGroupRefresh"`
|
// group membership is often used to bind authorization policies, it is important
|
||||||
|
// to keep the groups observed in Kubernetes clusters in-sync with the identity
|
||||||
|
// provider.
|
||||||
|
//
|
||||||
|
// In some environments, frequent group membership queries may result in a
|
||||||
|
// significant performance impact on the identity provider and/or the supervisor.
|
||||||
|
// The best approach to handle performance impacts is to tweak the group query
|
||||||
|
// to be more performant, for example by disabling nested group search or by
|
||||||
|
// using a more targeted group search base.
|
||||||
|
//
|
||||||
|
// If the group search query cannot be made performant and you are willing to
|
||||||
|
// have group memberships remain static for approximately a day, then set
|
||||||
|
// skipGroupRefresh to true. This is an insecure configuration as authorization
|
||||||
|
// policies that are bound to group membership will not notice if a user has
|
||||||
|
// been removed from a particular group until their next login.
|
||||||
|
//
|
||||||
|
// This is an experimental feature that may be removed or significantly altered
|
||||||
|
// in the future. Consumers of this configuration should carefully read all
|
||||||
|
// release notes before upgrading to ensure that the meaning of this field has
|
||||||
|
// not changed.
|
||||||
|
SkipGroupRefresh bool `json:"skipGroupRefresh,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Spec for configuring an ActiveDirectory identity provider.
|
// Spec for configuring an ActiveDirectory identity provider.
|
||||||
|
@ -120,10 +120,30 @@ type LDAPIdentityProviderGroupSearch struct {
|
|||||||
// +optional
|
// +optional
|
||||||
Attributes LDAPIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
Attributes LDAPIdentityProviderGroupSearchAttributes `json:"attributes,omitempty"`
|
||||||
|
|
||||||
// SkipGroupRefresh skips the group refresh operation that occurs with each refresh
|
// The user's group membership is refreshed as they interact with the supervisor
|
||||||
// (every 5 minutes). This can be done if group search is very slow or resource intensive for the LDAP
|
// to obtain new credentials (as their old credentials expire). This allows group
|
||||||
// server.
|
// membership changes to be quickly reflected into Kubernetes clusters. Since
|
||||||
SkipGroupRefresh bool `json:"skipGroupRefresh"`
|
// group membership is often used to bind authorization policies, it is important
|
||||||
|
// to keep the groups observed in Kubernetes clusters in-sync with the identity
|
||||||
|
// provider.
|
||||||
|
//
|
||||||
|
// In some environments, frequent group membership queries may result in a
|
||||||
|
// significant performance impact on the identity provider and/or the supervisor.
|
||||||
|
// The best approach to handle performance impacts is to tweak the group query
|
||||||
|
// to be more performant, for example by disabling nested group search or by
|
||||||
|
// using a more targeted group search base.
|
||||||
|
//
|
||||||
|
// If the group search query cannot be made performant and you are willing to
|
||||||
|
// have group memberships remain static for approximately a day, then set
|
||||||
|
// skipGroupRefresh to true. This is an insecure configuration as authorization
|
||||||
|
// policies that are bound to group membership will not notice if a user has
|
||||||
|
// been removed from a particular group until their next login.
|
||||||
|
//
|
||||||
|
// This is an experimental feature that may be removed or significantly altered
|
||||||
|
// in the future. Consumers of this configuration should carefully read all
|
||||||
|
// release notes before upgrading to ensure that the meaning of this field has
|
||||||
|
// not changed.
|
||||||
|
SkipGroupRefresh bool `json:"skipGroupRefresh,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Spec for configuring an LDAP identity provider.
|
// Spec for configuring an LDAP identity provider.
|
||||||
|
Loading…
Reference in New Issue
Block a user