Skip to content

Conversation

@lmktfy
Copy link
Member

@lmktfy lmktfy commented Nov 23, 2025

PR #52907 added a page about user impersonation that will go live when v1.35 is released.

Build on that to:

  • make it clear that the authenticating reverse proxy mode is separate from user impersonation
  • help readers find the command line options that are relevant to authentication

Based on PR #50364 but not directly derived from it.

/language en
/sig auth

@k8s-ci-robot k8s-ci-robot added this to the 1.35 milestone Nov 23, 2025
@k8s-ci-robot k8s-ci-robot added language/en Issues or PRs related to English language sig/auth Categorizes an issue or PR as relevant to SIG Auth. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. labels Nov 23, 2025
@netlify
Copy link

netlify bot commented Nov 23, 2025

👷 Deploy Preview for kubernetes-io-vnext-staging processing.

Name Link
🔨 Latest commit 483c821
🔍 Latest deploy log https://app.netlify.com/projects/kubernetes-io-vnext-staging/deploys/69234bdbf2bd170008822eaa

@k8s-ci-robot k8s-ci-robot requested a review from deads2k November 23, 2025 14:33
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign reylejano for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot requested a review from liggitt November 23, 2025 14:33
@k8s-ci-robot k8s-ci-robot added the size/L Denotes a PR that changes 100-499 lines, ignoring generated files. label Nov 23, 2025
@netlify
Copy link

netlify bot commented Nov 23, 2025

Pull request preview available for checking

Built without sensitive environment variables

Name Link
🔨 Latest commit 483c821
🔍 Latest deploy log https://app.netlify.com/projects/kubernetes-io-main-staging/deploys/69234bdbb4fce6000881e78a
😎 Deploy Preview https://deploy-preview-53397--kubernetes-io-main-staging.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

Comment on lines -1095 to -1098
{{< note >}}
Prior to Kubernetes 1.11.3 (and 1.10.7, 1.9.11), the `extra` key could only contain characters that
were [legal in HTTP header labels](https://tools.ietf.org/html/rfc7230#section-3.2.6).
{{< /note >}}
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I propose to remove this because none of those older versions have been supported for some time.

@lmktfy lmktfy force-pushed the 20251123_explain_authn_configuration branch from ee512b1 to 483c821 Compare November 23, 2025 18:00
@enj enj moved this to Needs Triage in SIG Auth Nov 24, 2025
@enj enj added this to SIG Auth Nov 24, 2025
@pmengelbert
Copy link

/assign @aramase

@dipesh-rawat
Copy link
Member

Hello @kubernetes/sig-auth-pr-reviews, we would appreciate your review of these proposed changes ahead of the v1.35 release next week. Please add LGTM if everything looks good. Thank you!

#### Bootstrap token configuration {#api-server-authn-config-cli-bootstrap}

`--enable-bootstrap-token-auth`
: When this flag is set, you can use [bootstrap tokens](#bootstrap-tokens) to authenticate.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we want to indicate the default values for these flags? This one defaults to false.


#### Anonymous authentication configuration {#api-server-authn-config-cli-anonymous}

`--anonymous-auth`
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we want to indicate the default values for these flags? This one defaults to true.

#### Certificate authentication configuration {#api-server-authn-config-cli-x-509}

`--client-ca-file`
: The path to the trust anchor for validating client identity, when clients use X.509 certificate authentication.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
: The path to the trust anchor for validating client identity, when clients use X.509 certificate authentication.
: The path to the trust anchor(s) for validating client identity, when clients use X.509 certificate authentication.

Also, we could note that the contents of this file can be changed while the apiserver is running and is re-read. Modifications to this file should be done in an atomic way (writing to a peer temporary file, then renaming the temporary file to replace this file, etc).

#### OIDC configuration {#api-server-authn-config-cli-oidc}

`--oidc-ca-file`
: The path to the trust anchor for validating client identity, when clients use OIDC.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
: The path to the trust anchor for validating client identity, when clients use OIDC.
: The path to the trust anchor(s) for validating client identity, when clients use OIDC.

This file is not re-read if modified while the apiserver is running.

: Defines the authentication audience for service account tokens.

`--service-account-extend-token-expiration`
: This flag turns on projected service account expiration extension during token generation, which helps safe transition from legacy tokens to bound service account token feature. See [authenticating service account credentials](/docs/concepts/security/service-accounts/#authenticating-credentials).
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This defaults to true

: Path to socket where an external JWT signer is listening. You can use this to integrate with an external token signer.

`--service-account-signing-key-file`
: Path to the file that contains the current private key of the service account token issuer.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Changes to this file while the API server is running are not re-read.

#### Static token configuration {#api-server-authn-config-cli-bearer}

`--token-auth-file`
: Path to the configuration file for [static bearer tokens](#static-token-file).
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Changes to this file while the API server is running are not re-read.

: How long (as a Kubernetes duration specification) the API server should cache the outcome of HTTP callouts to validate tokens.

`--authentication-token-webhook-config-file`
: The path to a kubeconfig format client configuration, that specifies how the API server authenticates when making HTTP callouts.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Changes to this file while the API server is running are not re-read.


`--requestheader-client-ca-file`
: _Required._
Path to a PEM-encoded certificate bundle.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Path to a PEM-encoded certificate bundle.
Path to a PEM-encoded certificate bundle containing trust anchor(s) for validating authenticating proxy identity.

#### Configuration file path {#api-server-authn-config-cli-general}

`--authentication-config`
: This special command line argument specifies that you want to [configure authentication using a configuration file](#api-server-authn-config-file).
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The contents of this file can be changed while the apiserver is running and is re-read. Modifications to this file should be done in an atomic way (writing to a peer temporary file, then renaming the temporary file to replace this file, etc).

@lmktfy
Copy link
Member Author

lmktfy commented Dec 11, 2025

Feedback noted, but I don't plan to do any fixups this year, 2025, to the authn pages work stream from
PR #52907 and predecessors.
Maybe I'll revisit next year

  • If it's an improvement on the current state of dev-1.35, merge it
  • if not, someone else can build on the PR, or the fixes will happen later

(bear in mind that every push back on a PR is a message of discouragement…)

@aramase aramase moved this from Needs Triage to Changes Requested in SIG Auth Dec 15, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. language/en Issues or PRs related to English language sig/auth Categorizes an issue or PR as relevant to SIG Auth. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.

Projects

Status: Changes Requested

Development

Successfully merging this pull request may close these issues.

6 participants