Authentication, Authentication, Authorization Flashcards
Export the existing OAuth cluster resource to a file
oc get oauth cluster -o yaml > oauth.yaml
Update oAuth cluster resource afters aving it to file
oc replace -f oauth.yaml
Create the htpasswd file
htpasswd -c -B -b /tmp/htpasswd student redhat123
Add or update credentials in htpasswd file
htpasswd -b /tmp/htpasswd student redhat1234
Delete credentials in htpasswd file
htpasswd -D /tmp/htpasswd student
create a secret that contains the htpasswd file data
oc create secret generic htpasswd-secret –from-file htpasswd=/tmp/htpasswd -n openshift-config
3 steps to completely detele a htpasswd user
1) htpasswd -D /tmp/htpasswd manager
2) oc set data secret/htpasswd-secret –from-file htpasswd=/tmp/htpasswd -n openshift-config
3) oc delete user manager
List all identity resources
oc get identities
Delete an identity resource
oc delete identity my_htpasswd_provider:manager
Assign the cluster-admin role to the student user
oc adm policy add-cluster-role-to-user cluster-admin student
Assign the cluster-role role to the student user
oc adm policy add-cluster-role-to-user cluster-role student
Remove the cluster-role role from the student user
oc adm policy remove-cluster-role-from-user cluster-role student
Determine if a user can execute an action on a resource
oc adm policy who-can delete user
oc adm policy who-can /verb/ /resource/
Add a specified role to a user
oc adm policy add-role-to-user role-name username -n project
Mentally list all user types
- regular users
- system users
- service accounts
Create a generic secret containing key-value pairs from literal values typed on the command line
oc create secret generic secret_name –from-literal key1=secret1 –from-literal key2=secret2
Create a generic secret using key names specified on the command line and values from files
oc create secret generic ssh-keys –from-file id_rsa=/path-to/id_rsa –from-file id_rsa.pub=/path-to/id_rsa.pub
Create a secret specifying a certificate and the associated key
oc create secret tls secret-tls –cert /path-to-certificate –key /path-to-key
set application environment variables from secrets
oc set env deployment/demo –from secret/demo-secret –prefix MYSQL_
mount secrets as file in a pod
oc set volume deployment/demo –add –type secret –secret-name demo-secret –mount-path /app-secrets
create a configuration map
oc create configmap my-config –from-literal key1=config1 –from-literal key2=config2
Save the cm data to a specific directory
oc extract cm/myconfig –to /tmp/ –confirm
Update modified secret file
oc set data secret/htpasswd-ppklq -n openshift-config –from-file /tmp/htpasswd
Command to list all scc defined in OpenShift
oc get scc
Obtain more info on an scc
oc describe scc anyuid
view the security context constraint that a pod uses
oc describe pod console-5df4fcbb47-67c52 -n openshift-console | grep scc
Command to list all the security context constraints that can overcome the limitations of a container
oc get pod podname -o yaml | oc adm policy scc-subject-review -f -
Create service account
oc create serviceaccount service-account-name
Associate a service account with an SCC
oc adm policy add-scc-to-user SCC -z service-account
Modify an existing deployment o to use a service account
oc set serviceaccount deployment/deployment-name service-account-name
Create self signed cert
openssl x509 -in training.csr -out training.pem -req -signkey training.key
nginx image
twalter/openshift-nginx
List all cluster role bindings that reference the self-provisioner cluster role
oc get clusterrolebinding | grep -E ‘NAME|self-provisioner’
Confirm that the group system:authenticated:oauth has the self-provisioner role
oc describe clusterrolebindings self-provisioners
Remove the self-provisioner role from group system:authenticated:oauth
oc adm policy remove-cluster-role-from-group self-provisioner system:authenticated:oauth
Grant project administration privileges to user leader on project auth-rbac
oc adm policy add-role-to-user admin leader
Create a group called dev-group
oc adm groups new dev-group
Add the qa-engineer user to qa-group
oc adm groups add-users qa-group qa-engineer
List all groups
oc get groups
Add write privileges to dev-group on the current project in which current user is logged in
oc adm policy add-role-to-group edit dev-group
Add read privileges to dev-group on the current project in which current user is logged in
oc policy add-role-to-group view qa-group
Check all roles people have on tthe current project
get rolebindings -o wide