-
Notifications
You must be signed in to change notification settings - Fork 84
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Supporting a Keycloak/Generic Provider #241
Comments
Thanks, @vishalkuo for opening the issue. For OIDC, what support in needed in Guard? I thought, you just need to configure kubectl properly: https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-kubectl |
I think we just want to manage all our authn via |
Can you please outline the changes/additions needed in Guard? |
I imagine what we'd want is a new |
Sounds good. If you want to open prs, you are welcome. Please note that you need to add e2e tests to make sure things work. |
We'd like to support keycloak (using OIDC) as a authn provider for our Guard setup. Is this something the team would accept as a PR / is there prior discussion around adding new providers that I should be aware of?
The text was updated successfully, but these errors were encountered: