vCluster.Pro Configuration
The vCluster.Pro config allows you to modify vCluster.Pro's behaviour and enable or disable certain features, such as SSO login, custom branding or auditing.
Changing vCluster.Pro Config
vCluster.Pro config can be applied directly via helm values or through the vCluster.Pro UI in Admin > Config. Using helm values allows you to declaratively deploy vCluster.Pro.
When using helm you can apply the vCluster.Pro config via a values.yaml file. This also makes it possible to deploy vCluster.Pro through GitOps solutions such as ArgoCD. An example vCluster.Pro values.yaml could look like this:
config:
loftHost: my-vcluster-host.com
audit:
enabled: true
auth:
github:
clientId: $CLIENT_ID
clientSecret: $CLIENT_SECRET
redirectURI: https://my-vcluster-host.com/auth/github/callback
For a complete overview what helm values are possible, please take a look at the Loft github repository directly.
Changing the Loft Host variable
After setting up the platform and TLS certificates and configuring the ingress to use a custom domain, one should change the loftHost variable shown above.
Initially, that value will be set to the URL of either the Loft Router domain or no domain in the case of air-gapped setups.
This value should be equal to the hostname specified in the ingress resource for accessing the platform.
This value of the loftHost variable should only be the hostname that vCluster.Pro Platform is reachable at and not contain protocols (such as HTTP) or subpaths.
After changing the loftHost, all currently connected clusters must be redeployed by running the same connection commands in the corresponding Kubernetes context.
See the instructions on connecting Clusters for more guidance.
Clusters will also have to be reconnected if the additionalCA or insecureSkipVerify values are changed after the initial setup.
Sensitive Information in the vCluster.Pro Config
Some fields within the vCluster.Pro config allow placeholders for environment variables, such as the clientId and clientSecret fields. This makes it possible to not expose the sensitive information directly inside the vCluster.Pro values and instead mount this information into vCluster.Pro through an external secret.
To load the github clientId and clientSecret through a Kubernetes secret my-secret, use the following configuration:
envValueFrom:
CLIENT_ID:
secretKeyRef:
name: my-secret
key: client_id
CLIENT_SECRET:
secretKeyRef:
name: my-secret
key: client_secret
config:
auth:
github:
clientId: $CLIENT_ID
clientSecret: $CLIENT_SECRET
redirectURI: https://my-vcluster-pro-host.com/auth/github/callback
Then use helm to apply this configuration:
helm upgrade loft vcluster-control-plane --install \
--repo https://charts.vcluster-pro.sh/ \
--version $VERSION
--namespace vcluster-pro \
--create-namespace \
--values values.yaml
Make sure to replace the $VERSION in the above statement with the vCluster.Pro version you are using
Custom HTTP Headers
vCluster.Pro allows you to add custom HTTP headers to all requests that are sent to the vCluster.Pro API. This can be useful if you want to add custom headers to all requests, such as X-Frame-Options or X-XSS-Protection.
To add custom HTTP headers, use the following configuration:
config:
auth:
customHttpHeaders:
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Config Reference
auth required object
Authentication holds the information for authentication
auth required object oidc required object
OIDC holds oidc authentication configuration
oidc required object issuerUrl required string
IssuerURL is the URL the provider signs ID Tokens as. This will be the "iss"
field of all tokens produced by the provider and is used for configuration
discovery.
The URL is usually the provider's URL without a path, for example
"https://accounts.google.com" or "https://login.salesforce.com".
The provider must implement configuration discovery.
See: https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig
issuerUrl required string clientId required string
ClientID the JWT must be issued for, the "sub" field. This plugin only trusts a single
client to ensure the plugin can be used with public providers.
The plugin supports the "authorized party" OpenID Connect claim, which allows
specialized providers to issue tokens to a client for a different client.
See: https://openid.net/specs/openid-connect-core-1_0.html#IDToken
clientId required string clientSecret required string
ClientSecret to issue tokens from the OIDC provider
clientSecret required string redirectURI required string
loft redirect uri. E.g. https://loft.my.domain/auth/oidc/callback
redirectURI required string postLogoutRedirectURI required string
Loft URI to be redirected to after successful logout by OIDC Provider
postLogoutRedirectURI required string caFile required string
Path to a PEM encoded root certificate of the provider. Optional
caFile required string insecureCa required boolean false
Specify whether to communicate without validating SSL certificates
insecureCa required boolean false preferredUsername required string
Configurable key which contains the preferred username claims
preferredUsername required string loftUsernameClaim required string
LoftUsernameClaim is the JWT field to use as the user's username.
loftUsernameClaim required string usernameClaim required string
UsernameClaim is the JWT field to use as the user's id.
usernameClaim required string emailClaim required string
EmailClaim is the JWT field to use as the user's email.
emailClaim required string usernamePrefix required string
UsernamePrefix, if specified, causes claims mapping to username to be prefix with
the provided value. A value "oidc:" would result in usernames like "oidc:john".
usernamePrefix required string groupsClaim required string
GroupsClaim, if specified, causes the OIDCAuthenticator to try to populate the user's
groups with an ID Token field. If the GroupsClaim field is present in an ID Token the value
must be a string or list of strings.
groupsClaim required string groups required string[]
If required groups is non empty, access is denied if the user is not part of at least one
of the specified groups.
groups required string[] scopes required string[]
Scopes that should be sent to the server. If empty, defaults to "email" and "profile".
scopes required string[] getUserInfo required boolean false
GetUserInfo, if specified, tells the OIDCAuthenticator to try to populate the user's
information from the UserInfo.
getUserInfo required boolean false groupsPrefix required string
GroupsPrefix, if specified, causes claims mapping to group names to be prefixed with the
value. A value "oidc:" would result in groups like "oidc:engineering" and "oidc:marketing".
groupsPrefix required string type required string
Type of the OIDC to show in the UI. Only for displaying purposes
type required string clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string groupClusterAccountTemplates required object[]
A mapping between groups and cluster account templates. If the user has a certain group, the cluster
account template will be added during creation
groupClusterAccountTemplates required object[] group required string
Group is the name of the group that should be matched
group required string clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string github required object
Github holds github authentication configuration
github required object clientId required string
ClientID holds the github client id
clientId required string clientSecret required string
ClientID holds the github client secret
clientSecret required string redirectURI required string
RedirectURI holds the redirect URI. Should be https://loft.domain.tld/auth/github/callback
redirectURI required string orgs required object[]
Loft queries the following organizations for group information.
Group claims are formatted as "(org):(team)".
For example if a user is part of the "engineering" team of the "coreos"
org, the group claim would include "coreos:engineering".
If orgs are specified in the config then user MUST be a member of at least one of the specified orgs to
authenticate with loft.
orgs required object[] name required string
Organization name in github (not slug, full name). Only users in this github
organization can authenticate.
name required string teams required string[]
Names of teams in a github organization. A user will be able to
authenticate if they are members of at least one of these teams. Users
in the organization can authenticate if this field is omitted from the
config file.
teams required string[] hostName required string
Required ONLY for GitHub Enterprise.
This is the Hostname of the GitHub Enterprise account listed on the
management console. Ensure this domain is routable on your network.
hostName required string rootCA required string
ONLY for GitHub Enterprise. Optional field.
Used to support self-signed or untrusted CA root certificates.
rootCA required string clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string groupClusterAccountTemplates required object[]
A mapping between groups and cluster account templates. If the user has a certain group, the cluster
account template will be added during creation
groupClusterAccountTemplates required object[] group required string
Group is the name of the group that should be matched
group required string clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string gitlab required object
Gitlab holds gitlab authentication configuration
gitlab required object clientId required string
Gitlab client id
clientId required string clientSecret required string
Gitlab client secret
clientSecret required string redirectURI required string
Redirect URI
redirectURI required string baseURL required string
BaseURL is optional, default = https://gitlab.com
baseURL required string groups required string[]
Optional groups whitelist, communicated through the "groups" scope.
If groups is omitted, all of the user's GitLab groups are returned.
If groups is provided, this acts as a whitelist - only the user's GitLab groups that are in the configured groups below will go into the groups claim. Conversely, if the user is not in any of the configured groups, the user will not be authenticated.
groups required string[] groups is omitted, all of the user's GitLab groups are returned.
If groups is provided, this acts as a whitelist - only the user's GitLab groups that are in the configured groups below will go into the groups claim. Conversely, if the user is not in any of the configured groups, the user will not be authenticated.clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string groupClusterAccountTemplates required object[]
A mapping between groups and cluster account templates. If the user has a certain group, the cluster
account template will be added during creation
groupClusterAccountTemplates required object[] group required string
Group is the name of the group that should be matched
group required string clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string google required object
Google holds google authentication configuration
google required object clientId required string
Google client id
clientId required string clientSecret required string
Google client secret
clientSecret required string redirectURI required string
loft redirect uri. E.g. https://loft.my.domain/auth/google/callback
redirectURI required string scopes required string[]
defaults to "profile" and "email"
scopes required string[] hostedDomains required string[]
Optional list of whitelisted domains
If this field is nonempty, only users from a listed domain will be allowed to log in
hostedDomains required string[] groups required string[]
Optional list of whitelisted groups
If this field is nonempty, only users from a listed group will be allowed to log in
groups required string[] serviceAccountFilePath required string
Optional path to service account json
If nonempty, and groups claim is made, will use authentication from file to
check groups with the admin directory api
serviceAccountFilePath required string adminEmail required string
Required if ServiceAccountFilePath
The email of a GSuite super user which the service account will impersonate
when listing groups
adminEmail required string clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string groupClusterAccountTemplates required object[]
A mapping between groups and cluster account templates. If the user has a certain group, the cluster
account template will be added during creation
groupClusterAccountTemplates required object[] group required string
Group is the name of the group that should be matched
group required string clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string microsoft required object
Microsoft holds microsoft authentication configuration
microsoft required object clientId required string
Microsoft client id
clientId required string clientSecret required string
Microsoft client secret
clientSecret required string redirectURI required string
loft redirect uri. Usually https://loft.my.domain/auth/microsoft/callback
redirectURI required string tenant required string
tenant configuration parameter controls what kinds of accounts may be authenticated in loft.
By default, all types of Microsoft accounts (consumers and organizations) can authenticate in loft via Microsoft.
To change this, set the tenant parameter to one of the following:
common - both personal and business/school accounts can authenticate in loft via Microsoft (default)
consumers - only personal accounts can authenticate in loft
organizations - only business/school accounts can authenticate in loft
tenant uuid or tenant name - only accounts belonging to specific tenant identified by either tenant uuid or tenant name can authenticate in loft
tenant required string groups required string[]
It is possible to require a user to be a member of a particular group in order to be successfully authenticated in loft.
groups required string[] onlySecurityGroups required boolean false
configuration option restricts the list to include only security groups. By default all groups (security, Office 365, mailing lists) are included.
onlySecurityGroups required boolean false useGroupsAsWhitelist required boolean false
Restrict the groups claims to include only the user’s groups that are in the configured groups
useGroupsAsWhitelist required boolean false clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string groupClusterAccountTemplates required object[]
A mapping between groups and cluster account templates. If the user has a certain group, the cluster
account template will be added during creation
groupClusterAccountTemplates required object[] group required string
Group is the name of the group that should be matched
group required string clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string saml required object
SAML holds saml authentication configuration
saml required object redirectURI required string
If the response assertion status value contains a Destination element, it
must match this value exactly.
Usually looks like https://your-loft-domain/auth/saml/callback
redirectURI required string ssoURL required string
SSO URL used for POST value.
ssoURL required string caData required string
CAData is a base64 encoded string that holds the ca certificate for validating the signature of the SAML response.
Either CAData, CA or InsecureSkipSignatureValidation needs to be defined.
caData required string usernameAttr required string
Name of attribute in the returned assertions to map to username
usernameAttr required string emailAttr required string
Name of attribute in the returned assertions to map to email
emailAttr required string groupsAttr required string
Name of attribute in the returned assertions to map to groups
groupsAttr required string ca required string
CA to use when validating the signature of the SAML response.
ca required string insecureSkipSignatureValidation required boolean false
Ignore the ca cert
insecureSkipSignatureValidation required boolean false entityIssuer required string
When provided Loft will include this as the Issuer value during AuthnRequest.
It will also override the redirectURI as the required audience when evaluating
AudienceRestriction elements in the response.
entityIssuer required string ssoIssuer required string
Issuer value expected in the SAML response. Optional.
ssoIssuer required string groupsDelim required string
If GroupsDelim is supplied the connector assumes groups are returned as a
single string instead of multiple attribute values. This delimiter will be
used split the groups string.
groupsDelim required string allowedGroups required string[]
List of groups to filter access based on membership
allowedGroups required string[] filterGroups required boolean false
If used with allowed groups, only forwards the allowed groups and not all
groups specified.
filterGroups required boolean false nameIDPolicyFormat required string
Requested format of the NameID. The NameID value is is mapped to the ID Token
'sub' claim.
This can be an abbreviated form of the full URI with just the last component. For
example, if this value is set to "emailAddress" the format will resolve to:
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
If no value is specified, this value defaults to:
urn:oasis:names:tc:SAML:2.0:nameid-format:persistent
nameIDPolicyFormat required string urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
urn:oasis:names:tc:SAML:2.0:nameid-format:persistent
password required object
Password holds password authentication relevant information
password required object disabled required boolean true
If true login via password is disabled
disabled required boolean true connectors required object[]
Connectors are optional additional connectors for Loft.
connectors required object[] id required string
ID is the id that should show up in the url
id required string displayName required string
DisplayName is the name that should show up in the ui
displayName required string oidc required object
OIDC holds oidc authentication configuration
oidc required object issuerUrl required string
IssuerURL is the URL the provider signs ID Tokens as. This will be the "iss"
field of all tokens produced by the provider and is used for configuration
discovery.
The URL is usually the provider's URL without a path, for example
"https://accounts.google.com" or "https://login.salesforce.com".
The provider must implement configuration discovery.
See: https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig
issuerUrl required string clientId required string
ClientID the JWT must be issued for, the "sub" field. This plugin only trusts a single
client to ensure the plugin can be used with public providers.
The plugin supports the "authorized party" OpenID Connect claim, which allows
specialized providers to issue tokens to a client for a different client.
See: https://openid.net/specs/openid-connect-core-1_0.html#IDToken
clientId required string clientSecret required string
ClientSecret to issue tokens from the OIDC provider
clientSecret required string redirectURI required string
loft redirect uri. E.g. https://loft.my.domain/auth/oidc/callback
redirectURI required string postLogoutRedirectURI required string
Loft URI to be redirected to after successful logout by OIDC Provider
postLogoutRedirectURI required string caFile required string
Path to a PEM encoded root certificate of the provider. Optional
caFile required string insecureCa required boolean false
Specify whether to communicate without validating SSL certificates
insecureCa required boolean false preferredUsername required string
Configurable key which contains the preferred username claims
preferredUsername required string loftUsernameClaim required string
LoftUsernameClaim is the JWT field to use as the user's username.
loftUsernameClaim required string usernameClaim required string
UsernameClaim is the JWT field to use as the user's id.
usernameClaim required string emailClaim required string
EmailClaim is the JWT field to use as the user's email.
emailClaim required string usernamePrefix required string
UsernamePrefix, if specified, causes claims mapping to username to be prefix with
the provided value. A value "oidc:" would result in usernames like "oidc:john".
usernamePrefix required string groupsClaim required string
GroupsClaim, if specified, causes the OIDCAuthenticator to try to populate the user's
groups with an ID Token field. If the GroupsClaim field is present in an ID Token the value
must be a string or list of strings.
groupsClaim required string groups required string[]
If required groups is non empty, access is denied if the user is not part of at least one
of the specified groups.
groups required string[] scopes required string[]
Scopes that should be sent to the server. If empty, defaults to "email" and "profile".
scopes required string[] getUserInfo required boolean false
GetUserInfo, if specified, tells the OIDCAuthenticator to try to populate the user's
information from the UserInfo.
getUserInfo required boolean false groupsPrefix required string
GroupsPrefix, if specified, causes claims mapping to group names to be prefixed with the
value. A value "oidc:" would result in groups like "oidc:engineering" and "oidc:marketing".
groupsPrefix required string type required string
Type of the OIDC to show in the UI. Only for displaying purposes
type required string clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string groupClusterAccountTemplates required object[]
A mapping between groups and cluster account templates. If the user has a certain group, the cluster
account template will be added during creation
groupClusterAccountTemplates required object[] group required string
Group is the name of the group that should be matched
group required string clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string github required object
Github holds github authentication configuration
github required object clientId required string
ClientID holds the github client id
clientId required string clientSecret required string
ClientID holds the github client secret
clientSecret required string redirectURI required string
RedirectURI holds the redirect URI. Should be https://loft.domain.tld/auth/github/callback
redirectURI required string orgs required object[]
Loft queries the following organizations for group information.
Group claims are formatted as "(org):(team)".
For example if a user is part of the "engineering" team of the "coreos"
org, the group claim would include "coreos:engineering".
If orgs are specified in the config then user MUST be a member of at least one of the specified orgs to
authenticate with loft.
orgs required object[] name required string
Organization name in github (not slug, full name). Only users in this github
organization can authenticate.
name required string teams required string[]
Names of teams in a github organization. A user will be able to
authenticate if they are members of at least one of these teams. Users
in the organization can authenticate if this field is omitted from the
config file.
teams required string[] hostName required string
Required ONLY for GitHub Enterprise.
This is the Hostname of the GitHub Enterprise account listed on the
management console. Ensure this domain is routable on your network.
hostName required string rootCA required string
ONLY for GitHub Enterprise. Optional field.
Used to support self-signed or untrusted CA root certificates.
rootCA required string clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string groupClusterAccountTemplates required object[]
A mapping between groups and cluster account templates. If the user has a certain group, the cluster
account template will be added during creation
groupClusterAccountTemplates required object[] group required string
Group is the name of the group that should be matched
group required string clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string gitlab required object
Gitlab holds gitlab authentication configuration
gitlab required object clientId required string
Gitlab client id
clientId required string clientSecret required string
Gitlab client secret
clientSecret required string redirectURI required string
Redirect URI
redirectURI required string baseURL required string
BaseURL is optional, default = https://gitlab.com
baseURL required string groups required string[]
Optional groups whitelist, communicated through the "groups" scope.
If groups is omitted, all of the user's GitLab groups are returned.
If groups is provided, this acts as a whitelist - only the user's GitLab groups that are in the configured groups below will go into the groups claim. Conversely, if the user is not in any of the configured groups, the user will not be authenticated.
groups required string[] groups is omitted, all of the user's GitLab groups are returned.
If groups is provided, this acts as a whitelist - only the user's GitLab groups that are in the configured groups below will go into the groups claim. Conversely, if the user is not in any of the configured groups, the user will not be authenticated.clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string groupClusterAccountTemplates required object[]
A mapping between groups and cluster account templates. If the user has a certain group, the cluster
account template will be added during creation
groupClusterAccountTemplates required object[] group required string
Group is the name of the group that should be matched
group required string clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string google required object
Google holds google authentication configuration
google required object clientId required string
Google client id
clientId required string clientSecret required string
Google client secret
clientSecret required string redirectURI required string
loft redirect uri. E.g. https://loft.my.domain/auth/google/callback
redirectURI required string scopes required string[]
defaults to "profile" and "email"
scopes required string[] hostedDomains required string[]
Optional list of whitelisted domains
If this field is nonempty, only users from a listed domain will be allowed to log in
hostedDomains required string[] groups required string[]
Optional list of whitelisted groups
If this field is nonempty, only users from a listed group will be allowed to log in
groups required string[] serviceAccountFilePath required string
Optional path to service account json
If nonempty, and groups claim is made, will use authentication from file to
check groups with the admin directory api
serviceAccountFilePath required string adminEmail required string
Required if ServiceAccountFilePath
The email of a GSuite super user which the service account will impersonate
when listing groups
adminEmail required string clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string groupClusterAccountTemplates required object[]
A mapping between groups and cluster account templates. If the user has a certain group, the cluster
account template will be added during creation
groupClusterAccountTemplates required object[] group required string
Group is the name of the group that should be matched
group required string clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string microsoft required object
Microsoft holds microsoft authentication configuration
microsoft required object clientId required string
Microsoft client id
clientId required string clientSecret required string
Microsoft client secret
clientSecret required string redirectURI required string
loft redirect uri. Usually https://loft.my.domain/auth/microsoft/callback
redirectURI required string tenant required string
tenant configuration parameter controls what kinds of accounts may be authenticated in loft.
By default, all types of Microsoft accounts (consumers and organizations) can authenticate in loft via Microsoft.
To change this, set the tenant parameter to one of the following:
common - both personal and business/school accounts can authenticate in loft via Microsoft (default)
consumers - only personal accounts can authenticate in loft
organizations - only business/school accounts can authenticate in loft
tenant uuid or tenant name - only accounts belonging to specific tenant identified by either tenant uuid or tenant name can authenticate in loft
tenant required string groups required string[]
It is possible to require a user to be a member of a particular group in order to be successfully authenticated in loft.
groups required string[] onlySecurityGroups required boolean false
configuration option restricts the list to include only security groups. By default all groups (security, Office 365, mailing lists) are included.
onlySecurityGroups required boolean false useGroupsAsWhitelist required boolean false
Restrict the groups claims to include only the user’s groups that are in the configured groups
useGroupsAsWhitelist required boolean false clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string groupClusterAccountTemplates required object[]
A mapping between groups and cluster account templates. If the user has a certain group, the cluster
account template will be added during creation
groupClusterAccountTemplates required object[] group required string
Group is the name of the group that should be matched
group required string clusterAccountTemplates required object[]
Cluster Account Templates that will be applied for users logging in through this authentication
clusterAccountTemplates required object[] name required string
Name of the cluster account template to apply
name required string sync required boolean false
Sync defines if Loft should sync changes to the cluster account template
to the cluster accounts and create new accounts if new clusters match the templates.
sync required boolean false accountName required string
AccountName is the name of the account that should
be created. Defaults to the user or team kubernetes name.
accountName required string saml required object
SAML holds saml authentication configuration
saml required object redirectURI required string
If the response assertion status value contains a Destination element, it
must match this value exactly.
Usually looks like https://your-loft-domain/auth/saml/callback
redirectURI required string ssoURL required string
SSO URL used for POST value.
ssoURL required string caData required string
CAData is a base64 encoded string that holds the ca certificate for validating the signature of the SAML response.
Either CAData, CA or InsecureSkipSignatureValidation needs to be defined.
caData required string usernameAttr required string
Name of attribute in the returned assertions to map to username
usernameAttr required string emailAttr required string
Name of attribute in the returned assertions to map to email
emailAttr required string groupsAttr required string
Name of attribute in the returned assertions to map to groups
groupsAttr required string ca required string
CA to use when validating the signature of the SAML response.
ca required string insecureSkipSignatureValidation required boolean false
Ignore the ca cert
insecureSkipSignatureValidation required boolean false entityIssuer required string
When provided Loft will include this as the Issuer value during AuthnRequest.
It will also override the redirectURI as the required audience when evaluating
AudienceRestriction elements in the response.
entityIssuer required string ssoIssuer required string
Issuer value expected in the SAML response. Optional.
ssoIssuer required string groupsDelim required string
If GroupsDelim is supplied the connector assumes groups are returned as a
single string instead of multiple attribute values. This delimiter will be
used split the groups string.
groupsDelim required string allowedGroups required string[]
List of groups to filter access based on membership
allowedGroups required string[] filterGroups required boolean false
If used with allowed groups, only forwards the allowed groups and not all
groups specified.
filterGroups required boolean false nameIDPolicyFormat required string
Requested format of the NameID. The NameID value is is mapped to the ID Token
'sub' claim.
This can be an abbreviated form of the full URI with just the last component. For
example, if this value is set to "emailAddress" the format will resolve to:
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
If no value is specified, this value defaults to:
urn:oasis:names:tc:SAML:2.0:nameid-format:persistent
nameIDPolicyFormat required string urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
urn:oasis:names:tc:SAML:2.0:nameid-format:persistent
disableTeamCreation required boolean false
Prevents from team creation for the new groups associated with the user at the time of logging in through sso,
Default behaviour is false, this means that teams will be created for new groups.
disableTeamCreation required boolean false accessKeyMaxTTLSeconds required integer
AccessKeyMaxTTLSeconds is the global maximum lifespan of an accesskey in seconds.
Leaving it 0 or unspecified will disable it.
Specifying 2592000 will mean all keys have a Time-To-Live of 30 days.
accessKeyMaxTTLSeconds required integer loginAccessKeyTTLSeconds required integer
LoginAccessKeyTTLSeconds is the time in seconds an access key is kept
until it is deleted.
Leaving it unspecified will default to 20 days.
Setting it to zero will disable the ttl.
Specifying 2592000 will mean all keys have a default Time-To-Live of 30 days.
loginAccessKeyTTLSeconds required integer customHttpHeaders required <customHttpHeader_name>:string
CustomHttpHeaders are additional headers that should be set for the authentication endpoints
customHttpHeaders required <customHttpHeader_name>:string oidc required object
OIDC holds oidc provider relevant information
oidc required object enabled required boolean true
If true indicates that loft will act as an OIDC server
enabled required boolean true wildcardRedirect required boolean true
If true indicates that loft will allow wildcard '*' in client redirectURIs
wildcardRedirect required boolean true clients required object[]
The clients that are allowed to request loft tokens
clients required object[] name required string
The client name
name required string clientId required string
The client id of the client
clientId required string clientSecret required string
The client secret of the client
clientSecret required string redirectURIs required string[]
A registered set of redirect URIs. When redirecting from dex to the client, the URI
requested to redirect to MUST match one of these values, unless the client is "public".
redirectURIs required string[] apps required object
Apps holds configuration around apps
apps required object noDefault required boolean false
If this option is true, loft will not try to parse the default apps
noDefault required boolean false repositories required object[]
These are additional repositories that are parsed by loft
repositories required object[] name required string
Name is the name of the repository
name required string url required string
URL is the repository url
url required string username required string
Username of the repository
username required string password required string
Password of the repository
password required string insecure required boolean false
Insecure specifies if the chart should be retrieved without TLS
verification
insecure required boolean false predefinedApps required object[]
Predefined apps that can be selected in the Spaces ) Space menu
predefinedApps required object[] chart required string
Chart holds the repo/chart name of the predefined app
chart required string initialVersion required string
InitialVersion holds the initial version of this app.
This version will be selected automatically.
initialVersion required string initialValues required string
InitialValues holds the initial values for this app.
The values will be prefilled automatically. There are certain
placeholders that can be used within the values that are replaced
by the loft UI automatically.
initialValues required string clusters required string[]
Holds the cluster names where to display this app
clusters required string[] title required string
Title is the name that should be displayed for the predefined app.
If empty the chart name is used.
title required string iconUrl required string
IconURL specifies an url to the icon that should be displayed for this app.
If none is specified the icon from the chart metadata is used.
iconUrl required string readmeUrl required string
ReadmeURL specifies an url to the readme page of this predefined app. If empty
an url will be constructed to artifact hub.
readmeUrl required string audit required object
Audit holds audit configuration
audit required object enabled required boolean false
If audit is enabled and incoming api requests will be logged based on the supplied policy.
enabled required boolean false disableAgentSyncBack required boolean false
If true, the agent will not send back any audit logs to Loft itself.
disableAgentSyncBack required boolean false level required integer
Level is an optional log level for audit logs. Cannot be used together with policy
level required integer policy required object
The audit policy to use and log requests. By default loft will not log anything
policy required object rules required object[]
Rules specify the audit Level a request should be recorded at.
A request may match multiple rules, in which case the FIRST matching rule is used.
The default audit level is None, but can be overridden by a catch-all rule at the end of the list.
PolicyRules are strictly ordered.
rules required object[] level required string
The Level that requests matching this rule are recorded at.
level required string users required string[]
The users (by authenticated user name) this rule applies to.
An empty list implies every user.
users required string[] userGroups required string[]
The user groups this rule applies to. A user is considered matching
if it is a member of any of the UserGroups.
An empty list implies every user group.
userGroups required string[] verbs required string[]
The verbs that match this rule.
An empty list implies every verb.
verbs required string[] resources required object[]
Resources that this rule matches. An empty list implies all kinds in all API groups.
resources required object[] group required string
Group is the name of the API group that contains the resources.
The empty string represents the core API group.
group required string resources required string[]
Resources is a list of resources this rule applies to.
For example:
'pods' matches pods.
'pods/log' matches the log subresource of pods.
'' matches all resources and their subresources.
'pods/' matches all subresources of pods.
'*/scale' matches all scale subresources.
If wildcard is present, the validation rule will ensure resources do not
overlap with each other.
An empty list implies all resources and subresources in this API groups apply.
resources required string[] resourceNames required string[]
ResourceNames is a list of resource instance names that the policy matches.
Using this field requires Resources to be specified.
An empty list implies that every instance of the resource is matched.
resourceNames required string[] namespaces required string[]
Namespaces that this rule matches.
The empty string "" matches non-namespaced resources.
An empty list implies every namespace.
namespaces required string[] nonResourceURLs required string[]
NonResourceURLs is a set of URL paths that should be audited.
s are allowed, but only as the full, final step in the path.
Examples:
"/metrics" - Log requests for apiserver metrics
"/healthz" - Log all health checks
nonResourceURLs required string[] omitStages required string[]
OmitStages is a list of stages for which no events are created. Note that this can also
be specified policy wide in which case the union of both are omitted.
An empty list means no restrictions will apply.
omitStages required string[] requestTargets required string[]
RequestTargets is a list of request targets for which events are created.
An empty list implies every request.
requestTargets required string[] clusters required string[]
Clusters that this rule matches. Only applies to cluster requests.
If this is set, no events for non cluster requests will be created.
An empty list means no restrictions will apply.
clusters required string[] omitStages required string[]
OmitStages is a list of stages for which no events are created. Note that this can also
be specified per rule in which case the union of both are omitted.
omitStages required string[] dataStoreEndpoint required string
DataStoreEndpoint is an endpoint to store events in.
dataStoreEndpoint required string dataStoreTTL required integer
DataStoreMaxAge is the maximum number of hours to retain old log events in the datastore
dataStoreTTL required integer path required string
The path where to save the audit log files. This is required if audit is enabled. Backup log files will
be retained in the same directory.
path required string maxAge required integer
MaxAge is the maximum number of days to retain old log files based on the
timestamp encoded in their filename. Note that a day is defined as 24
hours and may not exactly correspond to calendar days due to daylight
savings, leap seconds, etc. The default is not to remove old log files
based on age.
maxAge required integer maxBackups required integer
MaxBackups is the maximum number of old log files to retain. The default
is to retain all old log files (though MaxAge may still cause them to get
deleted.)
maxBackups required integer maxSize required integer
MaxSize is the maximum size in megabytes of the log file before it gets
rotated. It defaults to 100 megabytes.
maxSize required integer compress required boolean false
Compress determines if the rotated log files should be compressed
using gzip. The default is not to perform compression.
compress required boolean false loftHost required string
LoftHost holds the domain where the loft instance is hosted. This should not include https or http. E.g. loft.my-domain.com
loftHost required string devPodSubDomain required string
DevPodSubDomain holds a subdomain in the following form *.workspace.my-domain.com
devPodSubDomain required string uiSettings required object
UISettings holds the settings for modifying the Loft user interface
uiSettings required object loftVersion required string
LoftVersion holds the current loft version
loftVersion required string logoURL required string
LogoURL is url pointing to the logo to use in the Loft UI, this path must be accessible from clients accessing
the Loft UI!
logoURL required string legalTemplate required string
LegalTemplate is a text (html) string containing the legal template to prompt to users when authenticating to
Loft
legalTemplate required string primaryColor required string
PrimaryColor is the color value (ex: "#12345") to use as the primary color
primaryColor required string sidebarColor required string
SidebarColor is the color value (ex: "#12345") to use for the sidebar
sidebarColor required string accentColor required string
AccentColor is the color value (ex: "#12345") to use for the accent
accentColor required string customCss required string[]
CustomCSS holds URLs with custom css files that should be included when loading the UI
customCss required string[] customJavaScript required string[]
CustomJavaScript holds URLs with custom js files that should be included when loading the UI
customJavaScript required string[] navBarButtons required object[]
NavBarButtons holds extra nav bar buttons
navBarButtons required object[] position required string
Position holds the position of the button, can be one of:
TopStart, TopEnd, BottomStart, BottomEnd. Defaults to BottomEnd
position required string text required string
Text holds text for the button
text required string link required string
Link holds the link of the navbar button
link required string icon required string
Icon holds the url of the icon to display
icon required string vault required object
VaultIntegration holds the vault integration configuration
vault required object enabled required boolean false
Enabled indicates if the Vault Integration is enabled for the project -- this knob only
enables the syncing of secrets to or from Vault, but does not setup Kubernetes authentication
methods or Kubernetes secrets engines for vclusters.
enabled required boolean false address required string
Address defines the address of the Vault instance to use for this project.
Will default to the VAULT_ADDR environment variable if not provided.
address required string VAULT_ADDR environment variable if not provided.skipTLSVerify required boolean false
SkipTLSVerify defines if TLS verification should be skipped when connecting to Vault.
skipTLSVerify required boolean false namespace required string
Namespace defines the namespace to use when storing secrets in Vault.
namespace required string auth required object
Auth defines the authentication method to use for this project.
auth required object token required string
Token defines the token to use for authentication.
token required string tokenSecretRef required object
TokenSecretRef defines the Kubernetes secret to use for token authentication.
Will be used if token is not provided.
Secret data should contain the token key.
tokenSecretRef required object token is not provided.token key.name required string
Name of the referent.
More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
TODO: Add other useful fields. apiVersion, kind, uid?
name required string key required string
The key of the secret to select from. Must be a valid secret key.
key required string optional required boolean false
Specify whether the Secret or its key must be defined
optional required boolean false syncInterval required string
SyncInterval defines the interval at which to sync secrets from Vault.
Defaults to 1m.
See https://pkg.go.dev/time#ParseDuration for supported formats.
syncInterval required string 1m.
See https://pkg.go.dev/time#ParseDuration for supported formats.