Your cart is currently empty!
Kubernetes: User Authorization with Certificate
Generate a private key:
Shell
x
1
1
openssl genrsa -out newuser.key 2048
Generate a certificate signing request (csr) from private key:
CN is the user, O is the group.
Shell
1
1
1
openssl req -new -key newuser.key -out newuser.csr -subj "/CN=user/O=dev/O=ops"
We create CertificateSigningRequest to Kubernetes:
.spec.signerName read here.
YAML
1
13
13
1
apiVersion certificates.k8s.io/v1
2
kind CertificateSigningRequest
3
metadata
4
name newuser
5
spec
6
request LS0tLS1CRUdJTiBDRVJUSUZJQ0FURSBSRVFVRVN...
7
signerName kubernetes.io/kube-apiserver-client
8
usages
9
client auth
10
# Below this is not required
11
expirationSeconds 864000 # one day, default is one year
12
groups
13
system:authenticated
Once you send the CSR, you can query it with:
Shell
1
1
1
kubectl get csr
Now Admin will approve/deny the CSR:
Shell
1
2
1
kubectl certificate approve newuser
2
kubectl certificate deny newuser
Once you got approved, fetch the signed certificate and wrap in base64:
Shell
1
1
1
kubectl get csr/newuser -o jsonpath='{.status.certificate}' | base64 -d > newuser.crt
Using HTTP request:
Shell
1
1
1
curl https://<kubernetes-ip>:<kubernetes-port>/api --cert newuser.crt --key newuser.key --insecure
Using Kubeconfig:
Shell
1
1
1
kubectl config set-credentials newuser --client-key=newuser.key --client-certificate=newuser.crt --embed-certs=true
Set a new context:
Shell
1
1
1
kubectl config set-context newuser --current --user=newuser
Switch to new context:
Shell
1
1
1
kubectl config use-context newuser
At this point you should be able to access resources allowed by Role and RoleBinding for this user.
References: