Skip to content

Commit 56e5155

Browse files
author
Denise
authored
Merge pull request #1299 from rancher/staging
v2.2 Docs
2 parents 76f6fbb + bff838d commit 56e5155

File tree

179 files changed

+6406
-2755
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

179 files changed

+6406
-2755
lines changed

content/os/v1.x/en/about/running-rancher-on-rancherOS/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ rancher:
3737
```
3838
<br>
3939
40-
> **Note:** You can not name the service `rancher-agent` as this will not allow the rancher/agent container to be launched correctly. Please read more about why [you can't name your container as `rancher-agent`](https://rancher.com/docs/rancher/v1.6/en/faqs/agents/#adding-in-name-rancher-agent).
40+
> **Note:** You can not name the service `rancher-agent` as this will not allow the rancher/agent container to be launched correctly. Please read more about why [you can't name your container as `rancher-agent`]({{< baseurl >}}/rancher/v1.6/en/faqs/agents/#adding-in-name-rancher-agent).
4141

4242
### Adding in Host Labels
4343

Lines changed: 36 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,43 @@
11
---
2-
title: Administration
2+
title: Global Configuration
33
weight: 1100
44
aliases:
55
- /rancher/v2.x/en/concepts/global-configuration/
66
- /rancher/v2.x/en/tasks/global-configuration/
7+
- /rancher/v2.x/en/concepts/global-configuration/server-url/
8+
- /rancher/v2.x/en/tasks/global-configuration/server-url/
9+
- /rancher/v2.x/en/admin-settings/server-url/
10+
- /rancher/v2.x/en/admin-settings/log-in/
711
---
812

9-
After installation, the system administrator should configure Rancher to configure security, default settings, and user access.
13+
After installation, the [system administrator]({{< baseurl >}}/rancher/v2.x/en/admin-settings/rbac/global-permissions/) should configure Rancher to configure authentication, authorization, security, default settings, security policies, drivers and global DNS entries.
14+
15+
## First Log In
16+
17+
After you log into Rancher for the first time, Rancher will prompt you for a **Rancher Server URL**.You should set the URL to the main entry point to the Rancher Server. When a load balancer sits in front a Rancher Server cluster, the URL should resolve to the load balancer. The system will automatically try to infer the Rancher Server URL from the IP address or host name of the host running the Rancher Server. This is only correct if you are running a single node Rancher Server installation. In most cases, therefore, you need to set the Rancher Server URL to the correct value yourself.
18+
19+
>**Important!** After you set the Rancher Server URL, we do not support updating it. Set the URL with extreme care.
20+
21+
## Authentication
22+
23+
One of the key features that Rancher adds to Kubernetes is centralized user authentication. This feature allows to set up local users and/or connect to an external authentication provider. By connecting to an external authentication provider, you can leverage that provider's user and groups.
24+
25+
For more information how authentication works and how to configure each provider, see [Authentication]({{< baseurl >}}/rancher/v2.x/en/admin-settings/authentication/).
26+
27+
## Authorization
28+
29+
Within Rancher, each person authenticates as a _user_, which is a login that grants you access to Rancher. Once the user logs in to Rancher, their _authorization_, or their access rights within the system, is determined by the user's role. Rancher provides built-in roles to allow you to easily configure a user's permissions to resources, but Rancher also provides the ability to customize the roles for each Kubernetes resource.
30+
31+
For more information how authorization works and how to customize roles, see [Roles Based Access Control (RBAC)]({{< baseurl >}}/rancher/v2.x/en/admin-settings/rbac/).
32+
33+
## Pod Security Policies
34+
35+
_Pod Security Policies_ (or PSPs) are objects that control security-sensitive aspects of pod specification, e.g. root privileges. If a pod does not meet the conditions specified in the PSP, Kubernetes will not allow it to start, and Rancher will display an error message.
36+
37+
For more information how to create and use PSPs, see [Pod Security Policies]({{< baseurl >}}/rancher/v2.x/en/admin-settings/pod-security-policies/).
38+
39+
## Provisioning Drivers
40+
41+
Drivers in Rancher allow you to manage which providers can be used to provision [hosted Kubernetes clusters]({{< baseurl >}}/rancher/v2.x/en/cluster-provisioning/hosted-kubernetes-clusters/) or [nodes in an infrastructure provider]({{< baseurl >}}/rancher/v2.x/en/cluster-provisioning/rke-clusters/node-pools/) to allow Rancher to deploy and manage Kubernetes.
42+
43+
For more information, see [Provisioning Drivers]({{< baseurl >}}/rancher/v2.x/en/admin-settings/drivers/).

content/rancher/v2.x/en/admin-settings/authentication/_index.md

Lines changed: 15 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Authentication
3-
weight: 1110
3+
weight: 1115
44
aliases:
55
- /rancher/v2.x/en/concepts/global-configuration/authentication/
66
- /rancher/v2.x/en/tasks/global-configuration/authentication/
@@ -12,9 +12,9 @@ This centralized user authentication is accomplished using the Rancher authentic
1212

1313
<!-- todomark add diagram -->
1414

15-
### External vs. Local Authentication
15+
## External vs. Local Authentication
1616

17-
The Rancher authentication proxy integrates with the following external authentication services. The following table lists the first version of Rancher each service debuted.
17+
The Rancher authentication proxy integrates with the following external authentication services. The following table lists the first version of Rancher each service debuted.
1818

1919
| Auth Service | Available as of |
2020
| ------------------------------------------------------------------------------------------------ | ---------------- |
@@ -26,13 +26,21 @@ The Rancher authentication proxy integrates with the following external authenti
2626
| [Microsoft AD FS]({{< baseurl >}}/rancher/v2.x/en/admin-settings/authentication/microsoft-adfs/) | v2.0.7 |
2727
| [PingIdentity]({{< baseurl >}}/rancher/v2.x/en/admin-settings/authentication/ping-federate/) | v2.0.7 |
2828
| [Keycloak]({{< baseurl >}}/rancher/v2.x/en/admin-settings/authentication/keycloak/) | v2.1.0 |
29-
29+
| [Okta]({{< baseurl >}}/rancher/v2.x/en/admin-settings/authentication/okta/) | v2.2.0 |
3030
<br/>
31-
However, Rancher also provides local authentication.
31+
However, Rancher also provides [local authentication]({{< baseurl >}}/rancher/v2.x/en/admin-settings/authentication/local/).
32+
33+
In most cases, you should use an external authentication service over local authentication, as external authentication allows user management from a central location. However, you may want a few local authentication users for managing Rancher under rare circumstances, such as if Active Directory is down.
34+
35+
## Users and Groups
36+
37+
Rancher relies on users and groups to determine who is allowed to log in to Rancher and which resources they can access. When authenticating with an external provider, groups are provided from the external provider based on the user. These users and groups are given specific roles to resources like clusters, projects, multi-cluster apps, and global DNS providers and entries. When you give access to a group, all users who are a member of that group in the authentication provider will be able to access the resource with the permissions that you've specified. For more information on roles and permissions, see [Role Based Access Control]({{< baseurl >}}/rancher/v2.x/en/admin-settings/rbac/).
38+
39+
> **Note:** Local authentication does not support creating or managing groups.
3240
33-
In most cases, you should use an external authentication service over local, as external authentication allows user management from a central location. However, you may want a few local authentication users for managing Rancher under rare circumstances, such as if Active Directory is down.
41+
For more information, see [Users and Groups]({{< baseurl >}}/rancher/v2.x/en/admin-settings/authentication/user-groups/)
3442

35-
### External Authentication Configuration and Principal Users
43+
## External Authentication Configuration and Principal Users
3644

3745
Configuration of external authentication requires:
3846

content/rancher/v2.x/en/admin-settings/authentication/azure-ad/_index.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -122,12 +122,10 @@ To use Azure AD with Rancher you must whitelist Rancher with Azure. You can comp
122122
1. From the **Reply URLs** blade, enter the URL of your Rancher Server, appended with the verification path: `<MY_RANCHER_URL>/verify-auth-azure`.
123123

124124
>**Tip:** You can find your personalized Azure reply URL in Rancher on the Azure AD Authentication page (Global View > Security Authentication > Azure AD).
125-
>
126-
> ![Reply URL Example]({{< baseurl >}}/img/rancher/azure-reply-url.png)
127125

128126
1. Click **Save**.
129127

130-
**Result:** Your reply URL is saved.
128+
**Result:** Your reply URL is saved.
131129

132130
>**Note:** It can take up to five minutes for this change to take affect, so don't be alarmed if you can't authenticate immediately after Azure AD configuration.
133131
@@ -179,13 +177,13 @@ Enter the values that you copied to your [text file](#tip).
179177

180178
1. Select **Azure AD**.
181179

182-
1. Complete the **Configure Azure AD Account** form using the information you copied while completing [Copy Azure Application Data](#4-copy-azure-application-data).
180+
1. Complete the **Configure Azure AD Account** form using the information you copied while completing [Copy Azure Application Data](#5-copy-azure-application-data).
183181

184182
>**Important:** When entering your Graph Endpoint, remove the tenant ID from the URL, like below.
185183
>
186184
><code>http<span>s://g</span>raph.windows.net/<del>abb5adde-bee8-4821-8b03-e63efdc7701c</del></code>
187185
188-
The following table maps the values you copied in the Azure portal to the fields in Rancher.
186+
The following table maps the values you copied in the Azure portal to the fields in Rancher.
189187

190188
| Rancher Field | Azure Value |
191189
| ------------------ | ------------------------------------- |

content/rancher/v2.x/en/admin-settings/authentication/keycloak/_index.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -58,13 +58,7 @@ If your organization uses Keycloak Identity Provider (IdP) for user authenticati
5858
5959
**Result:** Rancher is configured to work with Keycloak. Your users can now sign into Rancher using their Keycloak logins.
6060

61-
>**Keycloak Identity Provider Caveats:**
62-
>
63-
>- SAML Protocol does not support search or lookup for users or groups. Therefore, there is no validation on users or groups when adding them to Rancher.
64-
>- When adding users, the exact user IDs (i.e. `UID Field`) must be entered correctly. As you type the user ID, there will be no search for other user IDs that may match.
65-
>- When adding groups, you *must* select the group from the drop-down that is next to the text box. Rancher assumes that any input from the text box is a user.
66-
>
67-
> - The group drop-down shows *only* the groups that you are a member of. You will not be able to add groups that you are not a member of.
61+
{{< saml_caveats >}}
6862

6963
## Annex: Troubleshooting
7064

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,16 @@
11
---
2-
title: Configuring Local Authentication
2+
title: Local Authentication
33
weight: 1111
44
aliases:
55
- /rancher/v2.x/en/tasks/global-configuration/authentication/local-authentication/
66
---
77

8+
Local authentication is the default until you configure an external authentication provider. Local authentication is where Rancher stores the user information, i.e. names and passwords, of who can log in to Ranchehr. By default, the `admin` user that logs in to Rancher for the first time is a local user.
9+
10+
## Adding Local Users
11+
812
Regardless of whether you use external authentication, you should create a few local authentication users so that you can continue using Rancher if your external authentication service encounters issues.
913

10-
1. From the **Global** view, select **Users** from the main menu.
14+
1. From the **Global** view, select **Users** from the navigation bar.
1115

1216
2. Click **Add User**. Then complete the **Add User** form. Click **Create** when you're done.

content/rancher/v2.x/en/admin-settings/authentication/microsoft-adfs/_index.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -30,12 +30,7 @@ Setting up Microsoft AD FS with Rancher Server requires configuring AD FS on you
3030
- [1 — Configuring Microsoft AD FS for Rancher]({{< baseurl >}}/rancher/v2.x/en/admin-settings/authentication/microsoft-adfs/microsoft-adfs-setup)
3131
- [2 — Configuring Rancher for Microsoft AD FS]({{< baseurl >}}/rancher/v2.x/en/admin-settings/authentication/microsoft-adfs/rancher-adfs-setup)
3232

33-
>**Active Directory Federation Service Caveats:**
34-
>
35-
>- SAML Protocol does not support search or lookup for users or groups. Therefore, there is no validation on users or groups when adding them to Rancher.
36-
>- When adding users, the exact user IDs (i.e. `UID Field`) must be entered correctly. As you type the user ID, there will be no search for other user IDs that may match.
37-
>- When adding groups, you *must* select the group from the drop-down that is next to the text box. Rancher assumes that any input from the text box is a user.
38-
> - The group drop-down shows *only* the groups that you are a member of. You will not be able to add groups that you are not a member of.
33+
{{< saml_caveats >}}
3934

4035

4136
### [Next: Configuring Microsoft AD FS for Rancher]({{< baseurl >}}/rancher/v2.x/en/admin-settings/authentication/microsoft-adfs/microsoft-adfs-setup)
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
title: Configuring Okta (SAML)
3+
weight: 1210
4+
---
5+
6+
_Available as of v2.2.0_
7+
8+
If your organization uses Okta Identity Provider (IdP) for user authentication, you can configure Rancher to allow your users to log in using their IdP credentials.
9+
10+
## Prerequisites
11+
12+
In Okta, create a SAML Application with the settings below. See the [Okta documentation](https://developer.okta.com/standards/SAML/setting_up_a_saml_application_in_okta) for help.
13+
14+
Setting | Value
15+
------------|------------
16+
`Single Sign on URL` | `https://yourRancherHostURL/v1-saml/okta/saml/acs`
17+
`Audience URI (SP Entity ID)` | `https://yourRancherHostURL/v1-saml/okta/saml/metadata`
18+
19+
## Configuring Okta in Rancher
20+
21+
1. From the **Global** view, select **Security > Authentication** from the main menu.
22+
23+
1. Select **Okta**.
24+
25+
1. Complete the **Configure Okta Account** form. The examples below describe how you can map Okta attributes to fields within Rancher.
26+
27+
| Field | Description |
28+
| ------------------------- | ----------------------------------------------------------------------------- |
29+
| Display Name Field | The attribute that contains the display name of users. |
30+
| User Name Field | The attribute that contains the user name/given name. |
31+
| UID Field | An attribute that is unique to every user. |
32+
| Groups Field | Make entries for managing group memberships. |
33+
| Rancher API Host | The URL for your Rancher Server. |
34+
| Private Key / Certificate | A key/certificate pair to create a secure shell between Rancher and your IdP. |
35+
| Metadata XML | The `Identity Provider metadata` file that you find in the application `Sign On` section. |
36+
37+
>**Tip:** You can generate a key/certificate pair using an openssl command. For example:
38+
>
39+
> openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:2048 -keyout myservice.key -out myservice.crt
40+
41+
42+
1. After you complete the **Configure Okta Account** form, click **Authenticate with Okta**, which is at the bottom of the page.
43+
44+
Rancher redirects you to the IdP login page. Enter credentials that authenticate with Okta IdP to validate your Rancher Okta configuration.
45+
46+
>**Note:** If nothing seems to happen, it's likely because your browser blocked the pop-up. Make sure you disable the pop-up blocker for your rancher domain and whitelist it in any other extensions you might utilize.
47+
48+
**Result:** Rancher is configured to work with Okta. Your users can now sign into Rancher using their Okta logins.
49+
50+
{{< saml_caveats >}}

content/rancher/v2.x/en/admin-settings/authentication/ping-federate/_index.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -45,9 +45,4 @@ If your organization uses Ping Identity Provider (IdP) for user authentication,
4545
4646
**Result:** Rancher is configured to work with PingIdentity. Your users can now sign into Rancher using their PingIdentity logins.
4747

48-
>**Ping Identity Provider Caveats:**
49-
>
50-
>- SAML Protocol does not support search or lookup for users or groups. Therefore, there is no validation on users or groups when adding them to Rancher.
51-
>- When adding users, the exact user IDs (i.e. `UID Field`) must be entered correctly. As you type the user ID, there will be no search for other user IDs that may match.
52-
>- When adding groups, you *must* select the group from the drop-down that is next to the text box. Rancher assumes that any input from the text box is a user.
53-
> - The group drop-down shows *only* the groups that you are a member of. You will not be able to add groups that you are not a member of.
48+
{{< saml_caveats >}}

0 commit comments

Comments
 (0)