Bug 1470022 - SSO with Kibana through Openshift is not working with multiple Kibana replicas
Summary: SSO with Kibana through Openshift is not working with multiple Kibana replicas
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat CloudForms Management Engine
Classification: Red Hat
Component: Providers
Version: 5.8.0
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: GA
: cfme-future
Assignee: Loic Avenel
QA Contact: Einat Pacifici
URL:
Whiteboard: container
: 1468213 (view as bug list)
Depends On:
Blocks: 1461616
TreeView+ depends on / blocked
 
Reported: 2017-07-12 09:45 UTC by Erez Freiberger
Modified: 2018-12-11 16:54 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2018-12-11 16:54:45 UTC
Category: ---
Cloudforms Team: Container Management
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Erez Freiberger 2017-07-12 09:45:48 UTC
Description of problem:
The current protocol for SSO with Kibana through Openshift is sending the Kibana the management-admin (ManageIQ's Service Account) token with a temporary user-token and then giving that user-token to the user to connect to Kibana with it. The auth-proxy container on the Kibana pod has a map between user-tokens and service accounts (SA) token and knows to forward the SA token for authentication. This way we are hiding the SA token from the user.


ManageIQ          -> Kibana auth-proxy /sso/setup?auth_token=$$$&user_token=%%%
User              -> Kibana auth-proxy /sso/login?user_token=%%%
Kibana auth-proxy -> Openshift         authenticates with auth_token=$$$


When there are multiple replicas of Kibana, it is very common that one replica will get the /sso/setup requests from ManageIQ and another will get the users requests. The replica that gets the user's requests will then not known the SA token and will forward the user to authenticate with Openshift manually.



Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1. scale the logging-kibana dc for two or more replicas
oc scale dc/logging-kibana-ops --replicas=2

Actual results:
When clicking the External logging button in ManageIQ we are forwarded to authenticate with Openshift

Expected results:
Seamless SSO that will forward us into Kibana.

Additional info:

Comment 2 Federico Simoncelli 2017-07-12 13:47:47 UTC
*** Bug 1468213 has been marked as a duplicate of this bug. ***


Note You need to log in before you can comment on or make changes to this bug.