Hi,
to resolve issue #6223 , we updated Kubeapps from version 12.2.10 to version 12.4.2.
We use ADFS to authenticate on Kubeapps and unfortunately after the update, we were unable to access the portal listing the applications already deployed. We systematically return to the page which asks us to connect via OIDC.
We found a workaround by creating a RoleBinding, we tried to use the cluster role reader but without success
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: ns-admin
namespace: default
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: <user@email.com>
roleRef:
kind: ClusterRole
name: admin
apiGroup: rbac.authorization.k8s.io
I specify we confine users to prevent them from deploying applications elsewhere than in their namespace. We find that this behavior will generate security issues and lead to misunderstandings on the user side.
Is there a solution to solve this problem appeared with the last versions?
Regards
Hi,
to resolve issue #6223 , we updated Kubeapps from version 12.2.10 to version 12.4.2.
We use ADFS to authenticate on Kubeapps and unfortunately after the update, we were unable to access the portal listing the applications already deployed. We systematically return to the page which asks us to connect via OIDC.
We found a workaround by creating a RoleBinding, we tried to use the cluster role reader but without success
I specify we confine users to prevent them from deploying applications elsewhere than in their namespace. We find that this behavior will generate security issues and lead to misunderstandings on the user side.
Is there a solution to solve this problem appeared with the last versions?
Regards