Skip to content

ActiveDirectory / LDAP

Setup ActiveDirectory Authentication

Go to Administration -> Cluster Settings -> Global Configuration -> OAuth -> Add -> LDAP

Note

Important part is the URL!

Option Value
Name Active Directory
URL ldaps://domaincontroller/DC=demo,DC=openshift,DC=pub?sAMAccountName?sub
Bind DN service-account
Bind Password *********
Attributes ****
ID sAMAccountName
Preferred Username sAMAccountName
Name cn
Email mail

User filter examples

ldaps://domaincontroller/DC=demo,DC=openshift,DC=pub?sAMAccountName?sub?(&(filter=asdfg)(!(adsf=asdf)))

Filter:

  1. All user objectclass=person
  2. Member of group (inclusive nested group) OpenShift-User
  3. Active AD Account
1
2
3
4
5
(&
    (memberOf:1.2.840.113556.1.4.1941:=CN=OpenShift-User,OU=Gruppen,DC=demo,DC=openshift,DC=pub)
    (objectClass=person)
    (!(userAccountControl:1.2.840.113556.1.4.803:=2))
)

Group Sync

Documentation: https://docs.openshift.com/container-platform/latest/authentication/ldap-syncing.html

Create ldap sync configuration files

ldap-sync.yaml

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
kind: LDAPSyncConfig
apiVersion: v1
url: ldaps://domaincontroller
bindDN: service-account
bindPassword: '********'
insecure: false
ca: /ldap-sync/ca.crt
groupUIDNameMapping:
  "CN=Basis Server Admins,OU=Groups,DC=demo,DC=openshift,DC=pub": Basis-Server-Admins 
augmentedActiveDirectory:
    groupsQuery: 
        derefAliases: never
        pageSize: 0
    groupUIDAttribute: dn 
    groupNameAttributes: [ cn ] 
    usersQuery:
        baseDN: "DC=demo,DC=openshift,DC=pub"
        scope: sub
        derefAliases: never
        filter: (objectclass=person)
        pageSize: 0
    userNameAttributes: [ sAMAccountName ] 
    groupMembershipAttributes: [ "memberOf:1.2.840.113556.1.4.1941:" ] 

whitelist.txt

1
2
CN=Basis Server Admins,OU=Groups,DC=demo,DC=openshift,DC=pub
CN=OCP-Users,OU=Groups,DC=demo,DC=openshift,DC=pub

ca.crt

1
2
3
-----BEGIN CERTIFICATE-----
.....
-----END CERTIFICATE-----

Create secret with all ldap sync conf files

1
2
3
4
oc create secret generic ldap-sync \
    --from-file=ldap-sync.yaml=ldap-sync.yaml \
    --from-file=whitelist.txt=whitelist.txt \
    --from-file=ca.crt=ca.crt

Deploy recular sync via CronJob/ScheduledJob

Create ldap-group-sync cluster role

via OC

1
2
3
oc create clusterrole ldap-group-sync \
    --verb=create,update,patch,delete,get,list \
    --resource=groups.user.openshift.io

via YAML:

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  name: ldap-group-sync
rules:
- apiGroups:
  - user.openshift.io
  resources:
  - groups
  verbs:
  - create
  - update
  - patch
  - delete
  - get
  - list

Create project, service account and cluster-role-binding

1
2
3
4
5
oc new-project ldap-sync
oc create sa ldap-sync
oc adm policy add-cluster-role-to-user ldap-group-sync \
    -z ldap-sync \
    -n ldap-sync

Create CronJob

YAML

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
apiVersion: batch/v1beta1
kind: CronJob
metadata:
  name: ldap-group-sync
spec:
  # Format: https://en.wikipedia.org/wiki/Cron
  schedule: '@hourly'
  suspend: false
  jobTemplate:
    spec:
      template:
        spec:
          serviceAccountName: ldap-sync
          restartPolicy: Never
          containers:
            - name: oc-cli
              command:
                - /bin/oc
                - adm
                - groups
                - sync
                - --whitelist=/ldap-sync/whitelist.txt
                - --sync-config=/ldap-sync/ldap-sync.yaml
                - --confirm
              image: registry.redhat.io/openshift4/ose-cli
              imagePullPolicy: Always
              volumeMounts:
              - mountPath: /ldap-sync/
                name: config
                readOnly: true
          volumes:
          - name: config
            secret:
              defaultMode: 420
              secretName: ldap-sync

How to debug with ldapsearch

Install ldapsearch with yum install openldap-clients.x86_64

1
2
3
$ ldapsearch -x -H ldap://domaincontroler -D service-account \
    -b "DC=demo,DC=openshift.,DC=pub" \
    -W '(sAMAccountName=rbohne)'

Last update: April 12, 2020