Use an LDAP Service
This document describes how to use an LDAP service as an external identity provider, which allows you to authenticate users against the LDAP service.
Prerequisites
- You need to deploy a Kubernetes cluster and install KubeSphere in the cluster. For details, see Installing on Linux and Installing on Kubernetes.
- You need to obtain the manager distinguished name (DN) and manager password of an LDAP service.
Procedure
Log in to KubeSphere as
admin
, move the cursor to in the lower-right corner, click kubectl, and run the following command to editks-installer
of the CRDClusterConfiguration
:kubectl -n kubesphere-system edit cc ks-installer
Example:
spec: authentication: jwtSecret: '' maximumClockSkew: 10s multipleLogin: true oauthOptions: accessTokenMaxAge: 1h accessTokenInactivityTimeout: 30m identityProviders: - name: LDAP type: LDAPIdentityProvider mappingMethod: auto provider: host: 192.168.0.2:389 managerDN: uid=root,cn=users,dc=nas managerPassword: ******** userSearchBase: cn=users,dc=nas loginAttribute: uid mailAttribute: mail
Configure fields other than
oauthOptions:identityProviders
in thespec:authentication
section. For details, see Set Up External Authentication.Configure fields in
oauthOptions:identityProviders
section.name
: User-defined LDAP service name.type
: To use an LDAP service as an identity provider, you must set the value toLDAPIdentityProvider
.mappingMethod
: Account mapping method. The value can beauto
orlookup
.- If the value is
auto
(default), you need to specify a new username. KubeSphere automatically creates a user according to the username and maps the user to an LDAP user. - If the value is
lookup
, you need to perform step 4 to manually map an existing KubeSphere user to an LDAP user.
- If the value is
provider
:host
: Address and port number of the LDAP service.managerDN
: DN used to bind to the LDAP directory.managerPassword
: Password corresponding tomanagerDN
.userSearchBase
: User search base. Set the value to the DN of the directory level below which all LDAP users can be found.loginAttribute
: Attribute that identifies LDAP users.mailAttribute
: Attribute that identifies email addresses of LDAP users.
If
mappingMethod
is set tolookup
, run the following command and add the labels to map a KubeSphere user to an LDAP user. Skip this step ifmappingMethod
is set toauto
.kubectl edit user <KubeSphere username>
labels: iam.kubesphere.io/identify-provider: <LDAP service name> iam.kubesphere.io/origin-uid: <LDAP username>
After the fields are configured, save your changes, and wait until the restart of ks-installer is complete.
Note
The KubeSphere web console is unavailable during the restart of ks-installer. Please wait until the restart is complete.If you are using KubeSphere 3.2.0, run the following command after configuring LDAP and wait until
ks-installer
is up and running:kubectl -n kubesphere-system set image deployment/ks-apiserver *=kubesphere/ks-apiserver:v3.2.1
Note
If you are using KubeSphere 3.2.1, skip this step.Go to the KubeSphere login page and enter the username and password of an LDAP user to log in.
Note
The username of an LDAP user is the value of the attribute specified byloginAttribute
.
Feedback
Was this page Helpful?
Receive the latest news, articles and updates from KubeSphere
Thanks for the feedback. If you have a specific question about how to use KubeSphere, ask it on Slack. Open an issue in the GitHub repo if you want to report a problem or suggest an improvement.