GitOps for IBM Verify Access
This repository is using argo CD (or Red Hat Openshift Gitops) to create the operators needed for deploying IBM Verify Access, instatiating a basic runtime and web reverse proxy connected to the provided demo application. argo CD assumes Red Hat Openshift Gitops so if using other version namespace for argo CD applications/roles would need to be changed.
Automation is done using the ibmvia_autoconf Python library.
There are several options provided in this repo:
- Using local (embedded) LDAP
- Using remote LDAP with the provided openldap image part of verify access
- Using remote LDAP with IBM Verify Directory
See config directory for different examples. Current configuration is using IBM Verify Directory.
argo CD or Red Hat Enterprise Gitops needs to be installed in the cluster.
Installation will be done in the ibm-verify namespace. There are several references to that name in the files that would need to be updated in case another namespace should be used.
Create the project so the secrets in the next step can be created. For Openshift do
oc new-project ibm-verifyLiterals that is not added to the git repo needs to be added in a secret. Replace the values marked with <> in the command below (here using Openshift CLI).
ldap-binddn is cn=root for IBM Verify Directory and cn=root,secAuthority=Default for openldap (local or remote).
oc create -n ibm-verify secret generic ivia-secrets \
--from-literal=aac-code=<AAC activation code> \
--from-literal=base-code=<base activation code> \
--from-literal=fed-code=<federation activation code> \
--from-literal=cfgsvc-passwd=<configuration service password> \
--from-literal=ldap-binddn=<LDAP bind dn> \
--from-literal=ldap-passwd=<LDAP password> \
--from-literal=postgres-passwd=<postgres password> \
--from-literal=sec-passwd=<sec-master password>For Verify Directory also add this secret:
oc create -n ibm-verify secret generic isvd-secret \
--from-literal=admin_password=<admin password> \
--from-literal=license-key=<license key> \
--from-literal=replication_password=<replication password> \
--from-file=server_cert=<server cert pem file location> \
--from-file=server_key=<server private key pem file location>Run the following command to create the argo CD bootstrap application and then follow the progress in argo CD.
oc apply -f argocd/bootstrap.yamlTo access the configuration service, use the URL from this command:
oc get route -n ibm-verify ivia-config -o jsonpath='{.spec.host}'and for the web reverse proxy.
oc get route -n ibm-verify ivia-wrp -o jsonpath='{.spec.host}'Script to remove LDAP entries from verify directory created by configuration job in this repo
oc exec -n ibm-verify -i isvd-isvd-master-pvc -- bash -s < scripts/remove_ldap_entries.sh passw0rd