This workflow details OIDC authentication and authorization in Kubernetes: configure the OIDC provider on the API Server, generate a token via IAM tools, and access the cluster using kubectl with the token. The API Server validates the token while Capsule enforces tenant policies and group-based access.
OIDC Authentication & Authorization
{ "headers": [ "Step", "Component", "Action / Command" ], "rows": [ [ "1. Config OIDC", "API Server", "Configure OIDC provider on Kubernetes API Server (issuer: https://iam.cloud.infn.it, client ID, etc.)" ], [ "2. Generate Token", "User / IAM",
"
oidc-gen <user> --iss https://iam.cloud.infn.itoidc-token --aud icsc-k8s-roma1
"
], [ "3. Access Cluster", "kubectl",
"
kubectl --token=$token get pods
" ], [ "4. Authorize", "API Server / Capsule", "API Server validates OIDC token; Capsule enforces tenant policies and group-based access" ] ]}
Source: Workflow di autenticazione e autorizzazione tramite token OIDC
Speaker Notes
Diagramma: IAM → Token → API Server → Capsule
Context: Presentazione finale – Cluster Kubernetes RKE2 con Capsule, Ceph e OIDC (ICSC)