Configuring AWS Elastic Kubernetes Service (Amazon EKS) access
The specific steps to configure your Amazon EKS clusters to allow access management through the PingOne Privilege platform depend on the cluster’s authentication mode.
After an EKS cluster and its namespaces are created in AWS and the parent AWS account is onboarded to PingOne Privilege, you can manage access to Kubernetes objects at a granular level.
PingOne Privilege supports clusters that use the following EKS authentication modes:
-
EKS API
-
EKS API &
aws-authConfigMap -
aws-authConfigMap only
Configuring ConfigMap-only authentication
If your EKS cluster relies exclusively on the aws-auth ConfigMap for authentication, you must add the PingOne Privilege cross-account IAM role to this ConfigMap. By default, only the cluster’s creator has permission to modify this configuration.
-
In the PingOne Privilege admin console in the sidebar go to Clouds.
-
In the tile for the target AWS Account, click More Info.
-
Copy the Assume Role ARN.
-
From a terminal with
kubectlaccess to your EKS cluster, open theaws-authConfigMap for editing:kubectl edit -n kube-system configmap/aws-auth -
In the editor, add the copied role ARN to the
mapRolessection. Grant itsystem:masterspermissions.apiVersion: v1 kind: ConfigMap metadata: name: aws-auth namespace: kube-system data: mapRoles: | - rolearn: <YOUR_COPIED_ARN_HERE> username: procyon-admin:{{SessionName}} groups: - system:masters mapUsers: | - userarn: <...> username: <...> -
Save and close the file to apply the changes.
-
In the PingOne Privilege admin console, on the Resources tab, click Rescan.
-
After the rescan completes, in the sidebar, go to Targets.
-
Find the newly discovered cluster, click More Info and use the Manage toggle to onboard it. Learn more in Onboarding target resources.
Configuring EKS API-based authentication
If your EKS cluster is configured to use the EKS API for authentication (either exclusively or in combination with the ConfigMap), no additional kubectl configuration is required.
-
In the PingOne Privilege admin console, on your AWS account’s Resource tab, click Rescan.
-
After the rescan completes, go to Targets.
-
Find the newly discovered cluster, click More Info and use the Manage toggle to onboard it. Learn more in Onboarding target resources.
Additional considerations
Private clusters
If your EKS cluster is in a private VPC with no inbound internet access, you must deploy a PingOne Privilege gateway or relay within the same VPC.
Learn more in Gateways and relays.