Authentication
Understand how to setup authentication in Kubernetes.
Different users in Kubernetes
In a Kubernetes cluster, we have different users, for example,
- administrators - who manage the cluster
- developers - who deploy or test applications
- end-users - who access the application running in the cluster
- third-party applications or bots - that interact with the cluster for integration purpose
Authentication in Kubernetes
All user access is managed by the kube-apiserver. As mentioned before, the kube-apiserver is the front-end of the Kubernetes control plane. It authenticates the user and authorizes the user to perform the requested operation.
We have different ways to authenticate users in Kubernetes.
- Client certificates
- Static password file (Deprecated) - Contains a list of usernames and passwords
- Static token file - Containers a list of usernames and tokens
- Connect to an identity provider (third-party) - Like LDAP or Kerberos
- Service account tokens
Static password file (Deprecated)
In this method, we will create a csv file with password, username, and user Id. This file will be passed to the kube-apiserver using the --basic-auth-file
flag. You can find your kube-apiserver configuration file in /etc/kubernetes/manifests/kube-apiserver.yaml
.
- You can also specify the fourth column as the group to which the user belongs, but it is optional.
To authenticate users, you can use the following command.
Static token file
The concept is similar to the static password file. In this method, we will create a csv file with token, username, and user Id. This file will be passed to the kube-apiserver using the --token-auth-file
flag.
To authenticate users, you can use the following command.
Authenticate using kubeconfig
Refer to kubeconfig for more information.
Authenticate using kubectl proxy
Refer to api-groups for more information.
Authenticate using bootstrap token
Boostrap token is a token that is used to authenticate with the kube-apiserver when creating a new cluster or joining a new node to the cluster. The bootstrap token is valid for 24 hours by default.
- Once a node has successfully joined the Kubernetes cluster using a bootstrap token, the expiration of the bootstrap token does not affect the node's membership in the cluster. Bsc, the node will use a client certificate for authentication after joining the cluster.
- Bootstrap token is used only for the initial join process.
Step 1: Create a bootstrap token
There are two ways to create a bootstrap token.
-
Using kubeadm. Remember run this command on the node that has installed
kubeadm
tool.kubeadm token generate
- Generate and print a bootstrap token, but do not create it on the server.kubeadm token create
- Create bootstrap tokens on the server- You can append
--dry-run --print-join-command
to get the secret YAML content and join command.
- You can append
-
Manually
The bootstrap token format must match the following regex: ^[a-z0-9]{6}\.[a-z0-9]{16}$
Step 2: Store the bootstrap token into Kubernetes secret
The bootstrap token must exist in the kube-system
namespace.
usage-bootstrap-authentication
- indicates that the token can be used to authenticate to thekube-apiserver
as a bearer tokenusage-bootstrap-signing
- indicates that the token may be used to sign thecluster-info
ConfigMap.auth-extra-groups
system:bootstrappers:worker
- This group is typically used for worker nodes that are joining the cluster. Nodes in this group have permissions necessary to register themselves with the control plane and start running workloads.system:bootstrappers:ingress
- This group is used for nodes that are specifically joining the cluster to run ingress controllers. Nodes in this group have permissions tailored for ingress-related operations.system:bootstrappers:kubeadm:default-node-token
(default) - This group is used by kubeadm during the node join process. Nodes in this group have the default permissions required to join the cluster using a bootstrap token created by kubeadm.
Step 3: Get the worker node join command
On the control plane node, use kubeadm
with the token-id
and token-secret
that you generated in the previous steps to get the worker node join command.
Step 4: Join the worker node to the cluster
On the worker node or ssh
into the worker node, run the join command that you got from the previous step. In this example, I am using ssh
to connect to the worker node.
- Ensure that the worker node has
kubeadm
,kubelet
, andkubectl
installed.
Step 5: Verify the worker node already joined the cluster
You can verify the result from the master node (control plane node).
Step 6: Authenticate using the bootstrap secrets (Optional)
This step is optional. You can further authenticate using the secrets.
Authenticate using service account token
Step 1: Create a service account
Step 2: Associate the secret with the service account
Step 4: Create a Role and RoleBinding
We need to create a Role and RoleBinding to grant permissions to the service account. Let's said we only allow this service account to list pods in the default
namespace.