Kubazulo is a Kubernetes Authentication Tool designed to implement Azure Active Directory (Azure AD) authentication seamlessly into the Kubernetes API-Server communication process. It functions as an exec plugin within the kubeconfig file, enabling secure and efficient access management.
Key Features:
Authentication Support: Kubazulo supports both standalone and intermediate authentication flows, providing flexibility in different deployment scenarios.
Integration with kubectl: It integrates smoothly with kubectl, allowing users to authenticate using Azure AD credentials directly within their Kubernetes workflows.
Logging Capabilities: The tool provides detailed logging for troubleshooting and monitoring purposes, stored in the $HOME/.kube/kubazulo/application.log file.
Configuration Flexibility: Kubazulo offers multiple configuration options, including customization of login modes, callback ports, and token endpoints, ensuring adaptability to various environments.
Cross-Platform Compatibility: It works across different operating systems, making it versatile for diverse infrastructure setups.
Audience & Benefits:
Kubazulo is ideal for organizations leveraging Azure AD as their identity provider. It simplifies the authentication process for Kubernetes clusters by eliminating the need for additional infrastructure or complex setup steps, enhancing security and operational efficiency. Users benefit from a seamless integration with existing Azure AD configurations, enabling secure access to Kubernetes resources without compromising on performance.
Kubazulo can be installed via winget, ensuring easy deployment across supported environments.
README
kubazulo
Kubeconfig Authentication Helper for Kubernetes API-Server in cunjunction with kubectl
Description
kubazulo is a client-go credential (exec) plugin implementing azure authentication. It plugs in seemless into the process of communicating to the kubernetes API-Server.
For this the kubeconfig needs to be adapted.
Setup the k8s OIDC Provider
kubazulo can be used to authenticate to general kubernetes clusters using Azure Active Directory as an OIDC provider.
Create an AAD Enterprise Application and the corresponding App Registration. Check the Allow public client flows checkbox. Configure groups to be included in the response. Take a note of the directory (tenant) ID as $AAD_TENANT_ID and the application (client) ID as $AAD_CLIENT_ID
Configure the API server with the following flags: