-
Notifications
You must be signed in to change notification settings - Fork 3.1k
Open
Labels
area/authenticationkind/bugIssues that are defects reported by users or that we know have reached a real releaseIssues that are defects reported by users or that we know have reached a real releaseteam/colliethe team that is responsible for auth and rbac within rancherthe team that is responsible for auth and rbac within rancher
Description
Rancher Server Setup
- Rancher version: v2.9-head
3a6de11e
- Installation option (Docker install/Helm Chart):
- If Helm Chart, Kubernetes Cluster and version (RKE1, RKE2, k3s, EKS, etc): docker
Information about the Cluster
- Kubernetes version: v1.30.2+k3s2
- Cluster Type (Local/Downstream): downstream
Describe the bug
When GenericOIDC(keycloak) auth provider is enabled, auth provider users that are added to a cluster/project by their username are not able to access resources upon logging in. Only if a user is added by their userID will they have access to resources upon logging in.
To Reproduce
- Install rancher v2.9-head
- Create a downstream cluster
- Enable GenericOIDC using keycloak
- In the downstream cluster add testuser2 as a Cluster Owner
- Login as testuser2 and observe the downstream cluster is not listed
Expected Result
Users should be able to access resources when added by their username.
Metadata
Metadata
Assignees
Labels
area/authenticationkind/bugIssues that are defects reported by users or that we know have reached a real releaseIssues that are defects reported by users or that we know have reached a real releaseteam/colliethe team that is responsible for auth and rbac within rancherthe team that is responsible for auth and rbac within rancher