-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #1299 from rancher/staging
v2.2 Docs
- Loading branch information
Showing
179 changed files
with
6,406 additions
and
2,755 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,9 +1,43 @@ | ||
--- | ||
title: Administration | ||
title: Global Configuration | ||
weight: 1100 | ||
aliases: | ||
- /rancher/v2.x/en/concepts/global-configuration/ | ||
- /rancher/v2.x/en/tasks/global-configuration/ | ||
- /rancher/v2.x/en/concepts/global-configuration/server-url/ | ||
- /rancher/v2.x/en/tasks/global-configuration/server-url/ | ||
- /rancher/v2.x/en/admin-settings/server-url/ | ||
- /rancher/v2.x/en/admin-settings/log-in/ | ||
--- | ||
|
||
After installation, the system administrator should configure Rancher to configure security, default settings, and user access. | ||
After installation, the [system administrator]({{< baseurl >}}/rancher/v2.x/en/admin-settings/rbac/global-permissions/) should configure Rancher to configure authentication, authorization, security, default settings, security policies, drivers and global DNS entries. | ||
|
||
## First Log In | ||
|
||
After you log into Rancher for the first time, Rancher will prompt you for a **Rancher Server URL**.You should set the URL to the main entry point to the Rancher Server. When a load balancer sits in front a Rancher Server cluster, the URL should resolve to the load balancer. The system will automatically try to infer the Rancher Server URL from the IP address or host name of the host running the Rancher Server. This is only correct if you are running a single node Rancher Server installation. In most cases, therefore, you need to set the Rancher Server URL to the correct value yourself. | ||
|
||
>**Important!** After you set the Rancher Server URL, we do not support updating it. Set the URL with extreme care. | ||
## Authentication | ||
|
||
One of the key features that Rancher adds to Kubernetes is centralized user authentication. This feature allows to set up local users and/or connect to an external authentication provider. By connecting to an external authentication provider, you can leverage that provider's user and groups. | ||
|
||
For more information how authentication works and how to configure each provider, see [Authentication]({{< baseurl >}}/rancher/v2.x/en/admin-settings/authentication/). | ||
|
||
## Authorization | ||
|
||
Within Rancher, each person authenticates as a _user_, which is a login that grants you access to Rancher. Once the user logs in to Rancher, their _authorization_, or their access rights within the system, is determined by the user's role. Rancher provides built-in roles to allow you to easily configure a user's permissions to resources, but Rancher also provides the ability to customize the roles for each Kubernetes resource. | ||
|
||
For more information how authorization works and how to customize roles, see [Roles Based Access Control (RBAC)]({{< baseurl >}}/rancher/v2.x/en/admin-settings/rbac/). | ||
|
||
## Pod Security Policies | ||
|
||
_Pod Security Policies_ (or PSPs) are objects that control security-sensitive aspects of pod specification, e.g. root privileges. If a pod does not meet the conditions specified in the PSP, Kubernetes will not allow it to start, and Rancher will display an error message. | ||
|
||
For more information how to create and use PSPs, see [Pod Security Policies]({{< baseurl >}}/rancher/v2.x/en/admin-settings/pod-security-policies/). | ||
|
||
## Provisioning Drivers | ||
|
||
Drivers in Rancher allow you to manage which providers can be used to provision [hosted Kubernetes clusters]({{< baseurl >}}/rancher/v2.x/en/cluster-provisioning/hosted-kubernetes-clusters/) or [nodes in an infrastructure provider]({{< baseurl >}}/rancher/v2.x/en/cluster-provisioning/rke-clusters/node-pools/) to allow Rancher to deploy and manage Kubernetes. | ||
|
||
For more information, see [Provisioning Drivers]({{< baseurl >}}/rancher/v2.x/en/admin-settings/drivers/). |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
8 changes: 6 additions & 2 deletions
8
content/rancher/v2.x/en/admin-settings/authentication/local/_index.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,12 +1,16 @@ | ||
--- | ||
title: Configuring Local Authentication | ||
title: Local Authentication | ||
weight: 1111 | ||
aliases: | ||
- /rancher/v2.x/en/tasks/global-configuration/authentication/local-authentication/ | ||
--- | ||
|
||
Local authentication is the default until you configure an external authentication provider. Local authentication is where Rancher stores the user information, i.e. names and passwords, of who can log in to Ranchehr. By default, the `admin` user that logs in to Rancher for the first time is a local user. | ||
|
||
## Adding Local Users | ||
|
||
Regardless of whether you use external authentication, you should create a few local authentication users so that you can continue using Rancher if your external authentication service encounters issues. | ||
|
||
1. From the **Global** view, select **Users** from the main menu. | ||
1. From the **Global** view, select **Users** from the navigation bar. | ||
|
||
2. Click **Add User**. Then complete the **Add User** form. Click **Create** when you're done. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
50 changes: 50 additions & 0 deletions
50
content/rancher/v2.x/en/admin-settings/authentication/okta/_index.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,50 @@ | ||
--- | ||
title: Configuring Okta (SAML) | ||
weight: 1210 | ||
--- | ||
|
||
_Available as of v2.2.0_ | ||
|
||
If your organization uses Okta Identity Provider (IdP) for user authentication, you can configure Rancher to allow your users to log in using their IdP credentials. | ||
|
||
## Prerequisites | ||
|
||
In Okta, create a SAML Application with the settings below. See the [Okta documentation](https://developer.okta.com/standards/SAML/setting_up_a_saml_application_in_okta) for help. | ||
|
||
Setting | Value | ||
------------|------------ | ||
`Single Sign on URL` | `https://yourRancherHostURL/v1-saml/okta/saml/acs` | ||
`Audience URI (SP Entity ID)` | `https://yourRancherHostURL/v1-saml/okta/saml/metadata` | ||
|
||
## Configuring Okta in Rancher | ||
|
||
1. From the **Global** view, select **Security > Authentication** from the main menu. | ||
|
||
1. Select **Okta**. | ||
|
||
1. Complete the **Configure Okta Account** form. The examples below describe how you can map Okta attributes to fields within Rancher. | ||
|
||
| Field | Description | | ||
| ------------------------- | ----------------------------------------------------------------------------- | | ||
| Display Name Field | The attribute that contains the display name of users. | | ||
| User Name Field | The attribute that contains the user name/given name. | | ||
| UID Field | An attribute that is unique to every user. | | ||
| Groups Field | Make entries for managing group memberships. | | ||
| Rancher API Host | The URL for your Rancher Server. | | ||
| Private Key / Certificate | A key/certificate pair to create a secure shell between Rancher and your IdP. | | ||
| Metadata XML | The `Identity Provider metadata` file that you find in the application `Sign On` section. | | ||
|
||
>**Tip:** You can generate a key/certificate pair using an openssl command. For example: | ||
> | ||
> openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:2048 -keyout myservice.key -out myservice.crt | ||
|
||
|
||
1. After you complete the **Configure Okta Account** form, click **Authenticate with Okta**, which is at the bottom of the page. | ||
|
||
Rancher redirects you to the IdP login page. Enter credentials that authenticate with Okta IdP to validate your Rancher Okta configuration. | ||
|
||
>**Note:** If nothing seems to happen, it's likely because your browser blocked the pop-up. Make sure you disable the pop-up blocker for your rancher domain and whitelist it in any other extensions you might utilize. | ||
**Result:** Rancher is configured to work with Okta. Your users can now sign into Rancher using their Okta logins. | ||
|
||
{{< saml_caveats >}} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.