Bug 2351536 - Add support for IBM Security Verify to the dashboard oauth_proxy SSO configuration
Summary: Add support for IBM Security Verify to the dashboard oauth_proxy SSO configur...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Ceph Storage
Classification: Red Hat Storage
Component: Ceph-Dashboard
Version: 8.1
Hardware: Unspecified
OS: Unspecified
urgent
high
Target Milestone: ---
: 8.1
Assignee: Afreen
QA Contact: Vinayak Papnoi
Rivka Pollack
URL:
Whiteboard:
Depends On: 2368715
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-03-12 10:12 UTC by Afreen
Modified: 2025-06-26 12:28 UTC (History)
10 users (show)

Fixed In Version: ceph-19.2.1-211.el9cp
Doc Type: No Doc Update
Doc Text:
Clone Of:
Environment:
Last Closed: 2025-06-26 12:28:13 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHCEPH-10831 0 None None None 2025-03-12 10:15:07 UTC
Red Hat Issue Tracker RHCSDASH-1950 0 None None None 2025-06-05 14:09:14 UTC
Red Hat Product Errata RHSA-2025:9775 0 None None None 2025-06-26 12:28:17 UTC

Description Afreen 2025-03-12 10:12:06 UTC
https://jsw.ibm.com/browse/ISCE-1431

In 8.1 we are adding in EPIC: https://jsw.ibm.com/browse/ISCE-1383 the GA of the "Secure Management Gateway" feature.

This feature includes SSO capabilities for accessing the Dashboard and observability stack; in 8.0, we only support RHSSO/Keycloak.

In 8.1, we want to add as a supported SSO IBM Security Verify.

Comment 21 errata-xmlrpc 2025-06-26 12:28:13 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Important: Red Hat Ceph Storage 8.1 security, bug fix, and enhancement updates), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2025:9775


Note You need to log in before you can comment on or make changes to this bug.