Due to upgrade issues with the Envoy gateway and the offline installation environments, upgrading to MKE 4k 4.1.3 is not recommended. These issues are fixed in the 4.1.4 release. For version 4.1.3, Mirantis only supports fresh installations.
Setting up Okta as an OIDC provider#
To configure an Okta application to serve as your OIDC authentication provider for MKE 4k:
- Navigate to Okta and sign in to your account dashboard.
- Navigate to Applications > Applications and click Create App Integration.
- Select OIDC - OpenID Connect for Sign-in method.
- Select Web Application for Application Type.
-
For App integration name, choose a suitable name.
-
Configure the host for your redirect URLs:
- Sign-in redirect URIs:
http://<MKE 4k hostname>/dex/callback - Sign-out redirect URIs:
http://<MKE 4k hostname>
- Sign-in redirect URIs:
-
Click Save to generate the
clientSecretandclientIDin theGeneraltable of the application. - Set
.spec.authentication.oidc.issuerto your Okta domain,https://example.okta.comfor example, in yourmke4.yamlconfiguration file. - Add the generated
clientSecretandclientIDvalues to yourmke4.yamlconfiguration file. - Run the
mkectl applycommand with yourmke4.yamlconfiguration file.
Test authentication flow#
- Navigate to the MKE 4k Dashboard:
https://<MKE 4k hostname> - Select Log in with oidc. This will redirect you to the Okta login page for your application.
- Enter your credentials and click Sign In. If authentication is successful, you will be redirected to the MKE 4k Dashboard.