Hi team,
LDAP entry details:
dn: uid=rancher-service-account,ou=rancher,dc=techavidity,dc=in
Created rancher local principal name same as ldap uid(rancher-service-account) …Likewise password is same …
Not aware it’s needed or not but created sa also same name as ldap distinguished name and localprincipal name .
[root@******* sa]# cat sa-full-role.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: fluentd-service-account
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: rancher-service-account
subjects:
- kind: ServiceAccount
name: rancher-service-account
namespace: rancher
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: rancher-service-account
namespace: rancher
rules:
- apiGroups: ["*"]
resources:
- clusters
- namespaces
verbs:
- get
- watch
- list
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: rancher-service-account
namespace: rancher
secrets:
- name: rancher-sa-secret
In test and enable authentication place
entered local principal details
username: rancher-service-account
pasword: ******
If click enable getting authentication failed …Can anyone kindly point out my mistake and aid me to do ldap auth provider successfully …