Skip to content

Latest commit

 

History

History
31 lines (14 loc) · 1.71 KB

authentication-in-the-kyma-environment-85200d8.md

File metadata and controls

31 lines (14 loc) · 1.71 KB

Authentication in the Kyma Environment

To authenticate in the Kyma environment, you can either use the default identity provider (IdP) or set up a custom identity provider.

SAP BTP, Kyma runtime uses OpenID Connect for authentication. Kyma runtime is configured with a default IdP: a shared SAP Cloud Identity Services tenant. This is a good starting point for development and testing purposes. For production scenarios, it's recommended that you set up your own SAP Cloud Identity Services tenant which provides the following features:

  • manages users

  • manages user groups and binds cluster roles to the user groups instead of individual usernames in your Kyma runtime

  • configures your own risk-based security measures, such as two-factor authentication, IP ranges, etc.

  • delegates authentication to an upstream corporate IdP to prevent introducing redundant identities and to benefit from SSO, based on identity provided "centrally"

Learn how to Get Your Tenant from SAP Cloud Identity Services.

Alternatively, you can choose any other service compliant with OpenID Connect.

Having an SAP Cloud Identity Services tenant, you can configure it as the custom identity provider of your Kyma cluster. See Configure a Custom Identity Provider for Kyma.