Skip to main content
Redhat Developers  Logo
  • Products

    Platforms

    • Red Hat Enterprise Linux
      Red Hat Enterprise Linux Icon
    • Red Hat AI
      Red Hat AI
    • Red Hat OpenShift
      Openshift icon
    • Red Hat Ansible Automation Platform
      Ansible icon
    • View All Red Hat Products

    Featured

    • Red Hat build of OpenJDK
    • Red Hat Developer Hub
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenShift Dev Spaces
    • Red Hat OpenShift Local
    • Red Hat Developer Sandbox

      Try Red Hat products and technologies without setup or configuration fees for 30 days with this shared Openshift and Kubernetes cluster.
    • Try at no cost
  • Technologies

    Featured

    • AI/ML
      AI/ML Icon
    • Linux
      Linux Icon
    • Kubernetes
      Cloud icon
    • Automation
      Automation Icon showing arrows moving in a circle around a gear
    • View All Technologies
    • Programming Languages & Frameworks

      • Java
      • Python
      • JavaScript
    • System Design & Architecture

      • Red Hat architecture and design patterns
      • Microservices
      • Event-Driven Architecture
      • Databases
    • Developer Productivity

      • Developer productivity
      • Developer Tools
      • GitOps
    • Automated Data Processing

      • AI/ML
      • Data Science
      • Apache Kafka on Kubernetes
    • Platform Engineering

      • DevOps
      • DevSecOps
      • Ansible automation for applications and services
    • Secure Development & Architectures

      • Security
      • Secure coding
  • Learn

    Featured

    • Kubernetes & Cloud Native
      Openshift icon
    • Linux
      Rhel icon
    • Automation
      Ansible cloud icon
    • AI/ML
      AI/ML Icon
    • View All Learning Resources

    E-Books

    • GitOps Cookbook
    • Podman in Action
    • Kubernetes Operators
    • The Path to GitOps
    • View All E-books

    Cheat Sheets

    • Linux Commands
    • Bash Commands
    • Git
    • systemd Commands
    • View All Cheat Sheets

    Documentation

    • Product Documentation
    • API Catalog
    • Legacy Documentation
  • Developer Sandbox

    Developer Sandbox

    • Access Red Hat’s products and technologies without setup or configuration, and start developing quicker than ever before with our new, no-cost sandbox environments.
    • Explore Developer Sandbox

    Featured Developer Sandbox activities

    • Get started with your Developer Sandbox
    • OpenShift virtualization and application modernization using the Developer Sandbox
    • Explore all Developer Sandbox activities

    Ready to start developing apps?

    • Try at no cost
  • Blog
  • Events
  • Videos

Simplify access to your ROSA clusters using external OIDC

July 8, 2024
Adel Zaalouk Anjali Telang
Related topics:
Automation and managementDevOpsDevSecOpsGitOpsGoHybrid CloudKubernetes
Related products:
Red Hat OpenShiftRed Hat OpenShift Service on AWS

Share:

    This article introduces a new feature for Red Hat OpenShift Service on AWS (ROSA) with hosted control planes that simplifies authentication and authorization workflows through direct integration with your existing OpenID Connect (OIDC) compliant identity providers (IdPs). Now you can seamlessly leverage your corporate identity tokens to access the Red Hat OpenShift and Kubernetes APIs on ROSA with hosted control planes (HCP).

    Benefits you'll experience:

    • Simplified authentication: No need to manage separate credentials for ROSA. Just use your familiar corporate identity, making access easier and more secure.
    • Unified access control: Bring your existing user and group management policies into ROSA. Manage permissions consistently across your organization with a single, unified approach.
    • Streamlined automation: Automate tasks across hybrid and multicloud environments. Your existing workflows can be reused to interact with ROSA thanks to a shared identity provider.

    Behind the scenes details

    This integration follows standard Kubernetes OIDC authentication configuration for a smooth, familiar experience. We've tested it with well-known IdPs like Microsoft Entra ID (formerly Azure Active Directory) and Red Hat build of Keycloak to ensure compatibility. Additionally, we leverage Cluster API (CAPI) for seamless provisioning and management of your clusters with this enhanced authentication model.

    To better understand the flow, let’s examine the change through the eyes of Alice, Bob, and Carol, illustrated in Figure 1.

    External OIDC Integration with Hosted Control Planes (HCP) Flow
    Figure 1: OIDC provider Integration Flow.

    Meet Alice, the platform engineer

    Alice is the platform engineer who oversees the setup and maintenance of all ROSA clusters. Before, managing separate credentials for ROSA added unnecessary complexity and risk due to the added overhead. With external OIDC, Alice can:

    • Simplify her workflow: By connecting ROSA with the company's existing OIDC provider, Alice utilizes familiar tools and streamline access management.
    • Enhance security: Centralizing authentication and authorization practices minimizes the risk of compromised credentials.

    What Alice needs to do:

    • Register an OAuth client: Coordinate with the OIDC provider to set up an OAuth client tailored for user and group management. More details can be found in Tutorials for Red Hat OpenShift Service on AWS 4.

    Meet Bob, the cluster administrator

    Bob is the cluster administrator tasked with managing permissions for different teams within the organization across multiple clusters. Previously, for each cluster Bob needed to administer, he had to replicate these permissions across the fleet of ROSA clusters he manages, which was both time-consuming and prone to errors. Now, Bob can:

    • Save time: By integrating the company's existing Identity Provider (IdP), Bob streamlines permissions across all the ROSA clusters, ensuring consistency and reducing manual tasks.
    • Empower teams: With this integration, teams utilize their existing credentials to access ROSA, eliminating the need for Bob to create and manage separate accounts.

    What Bob needs to do:

    • Create a ROSA cluster with external authentication enabled: rosa create cluster --hosted-cp --region --external-auth-providers=enabled ....
    • Configure the external authentication provider: rosa create external-auth-provider.
    • (Optional) Set up break-glass credentials for emergency access: rosa create break-glass-credentials.
    • Defines the necessary RBAC roles and permissions for users and groups.

    Meet Carol, the developer

    As a developer, Carol's role involves accessing ROSA clusters to deploy and manage applications. Previously, juggling multiple logins was both frustrating and inefficient. Now, Carol can:

    • Focus on development: Using a unified set of credentials, Carol efficiently navigates between different environments, enhancing her productivity.
    • Easily access resources: The streamlined login process with external OIDC reduces the hassle of managing multiple passwords or tokens, allowing Carol to focus more on her development tasks.

    What Carol needs to do:

    • Authenticate with corporate credentials: Log in using her corporate credentials to obtain a token from the IdP.
    • Use that token to directly access OpenShift/Kubernetes APIs using oc/kubectl (with the oc/ kubectl exec command) or the oc-oidc plugin.

    Available to use now!

    This feature is ready for use in your ROSA with hosted control planes clusters. Our documentation will guide you through the setup process. We encourage you to try it out and share your feedback with us. You can start here.

    If you need further assistance, you can reach out to us through the following methods:

    • OpenShift Commons Slack
    • OpenShift users Kubernetes Slack channel
    • Via your Red Hat account representative

    We hope you enjoy using Red Hat OpenShift Service on AWS with hosted control planes and look forward to hearing your feedback.

    Related Posts

    • Ensure a scalable and performant environment for ROSA with hosted control planes

    • How to add public Ingress to a PrivateLink ROSA cluster

    • HOW-TO setup 3scale OpenID Connect (OIDC) Integration with RH SSO

    • Run OpenShift sandboxed containers with hosted control planes

    • Over-provisioning nodes on OpenShift Service on AWS

    • Use Red Hat OpenShift's built-in OAuth server as an authentication provider in Open Liberty

    Recent Posts

    • Why some agentic AI developers are moving code from Python to Rust

    • Confidential VMs: The core of confidential containers

    • Benchmarking with GuideLLM in air-gapped OpenShift clusters

    • Run Qwen3-Next on vLLM with Red Hat AI: A step-by-step guide

    • How to implement observability with Python and Llama Stack

    What’s up next?

    Explore how the migration toolkit for containers (MTC) paves the way for seamless migration of application workloads from ROSA classic to ROSA HCP clusters, right down to the namespace level in this learning path.

    Start the activity
    Red Hat Developers logo LinkedIn YouTube Twitter Facebook

    Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform

    Build

    • Developer Sandbox
    • Developer Tools
    • Interactive Tutorials
    • API Catalog

    Quicklinks

    • Learning Resources
    • E-books
    • Cheat Sheets
    • Blog
    • Events
    • Newsletter

    Communicate

    • About us
    • Contact sales
    • Find a partner
    • Report a website issue
    • Site Status Dashboard
    • Report a security problem

    RED HAT DEVELOPER

    Build here. Go anywhere.

    We serve the builders. The problem solvers who create careers with code.

    Join us if you’re a developer, software engineer, web designer, front-end designer, UX designer, computer scientist, architect, tester, product manager, project manager or team lead.

    Sign me up

    Red Hat legal and privacy links

    • About Red Hat
    • Jobs
    • Events
    • Locations
    • Contact Red Hat
    • Red Hat Blog
    • Inclusion at Red Hat
    • Cool Stuff Store
    • Red Hat Summit
    © 2025 Red Hat

    Red Hat legal and privacy links

    • Privacy statement
    • Terms of use
    • All policies and guidelines
    • Digital accessibility

    Report a website issue