Kubernetes (User Impersonation)

When using StrongDM to proxy authentication with your Kubernetes resources, a leased credential is typically used. No matter how many StrongDM users access the resource, they can use that leased credential. User-level auditing and monitoring occur on the StrongDM side, and the actions are executed via the leased account with the resource.

In some cases, you may require that individual user details be recorded via native logging. User Impersonation mode can assist with this task. User Impersonation mode makes the initial connection to the Kubernetes endpoint using the leased credentials, as usual. But that request also includes headers with account and role details. If the named role matches a Role-Based Access Control (RBAC) group, the calling user is granted access to resources defined in that group rather than the level of access defined by the leased credentials.

For User Impersonation cluster types, if you intend to use RBAC, the role names in StrongDM need to match the group names in your Kubernetes. If necessary, StrongDM role names can be edited or Kubernetes groups can be remade with a new name. However, if some roles match and others do not, provisioning can still continue.

Utilizing User Impersonation mode results in your native Kubernetes logs identifying the particular user performing an action, rather than identifying all actions conducted via StrongDM connections as being performed by the single leased user account. The username employed is the user's email for their StrongDM user account. Their group(s) are whichever group(s) match their StrongDM role(s).

Set Up User Impersonation Mode

If you are using kubectl 1.30 or higher, it will default to using websockets, which the StrongDM client did not support prior to version 45.35.0. This can be remedied by taking one of the following actions:

  • Update your client to version 45.35.0 or greater.

  • Set the environment variable KUBECTL_REMOTE_COMMAND_WEBSOCKETS=false to restore the previous behavior in your kubectl.

Use the following steps to set up User Impersonation mode.

  1. Create your cluster if you do not have one already.

  1. Create your resource in StrongDM, choosing the User Impersonation mode version of a Kubernetes cluster.

  2. Set your RBAC rules to allow User Impersonation. The cluster-admin role has that information built in, but custom roles do not. If you have a custom role, create or edit your cluster role to be like the following example. In this example YAML file, the ClusterRole rules allow users with that role to view the specified cluster resources and to impersonate and review their access:

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRole
    metadata:
      annotations:
        rbac.authorization.kubernetes.io/autoupdate: "true"
      labels:
      name: view
    rules: # Ability to view only any of these cluster resources
    - apiGroups:
      - ""
      resources: 
      - "*"
      verbs:
      - get
      - list
      - watch
    - apiGroups:
      - extensions
      resources: 
      - "*"
      verbs:
      - get
      - list
      - watch
    - apiGroups:
      - apps
      resources: 
      - "*"
      verbs:
      - get
      - list
      - watch
    - apiGroups: # Ability to impersonate and review your own access
      - ""
      resources:
      - users
      - groups
      verbs:
      - impersonate
    - apiGroups:
      - "authorization.k8s.io"
      resources:
      - selfsubjectaccessreviews
      verbs:
      - create
  3. For most cluster types, you need to create a cluster role binding to map the user's StrongDM role to a group under RBAC. In the following example YAML file, the ClusterRoleBinding allows any user in the "engineering" group/role to read secrets in any namespace:

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: sdm-operator
    subjects:
    - kind: Group
      name: engineering # Name of the StrongDM role
      apiGroup: rbac.authorization.k8s.io
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: view # Name of the cluster role you want that StrongDM role to have

    You should use or create a role here that has the same rights as the leased credentials defined in the resource; the user in the given StrongDM role inherits only the rights in the RBAC group, not the rights defined in the leased credentials. This binding needs to be repeated for every desired StrongDM role.

    Note that you must be an administrator of the cluster with direct access to it (rather than through StrongDM) in order to apply the role binding (kubectl apply -f filename.yaml). Also, ensure that you have altered the group name (the StrongDM role) and the role name (the group name in Kubernetes).

When matching StrongDM role names to Kubernetes groups, the StrongDM role names are transformed to be shown in all lowercase letters, spaces are changed to hyphens, and periods are ignored. This means that some similar StrongDM role names might collide and cause problems. For example:

  • MyRole and myrole are acceptable StrongDM role names, but they appear the same after transformation: myrole.

  • Both My-Role and My role become my-role.

  • Periods are ignored, so My.Role becomes myrole.

In order to prevent issues, please keep this transformation in mind when creating the StrongDM roles you wish to use with Kubernetes.

  1. Configure your cluster to enable audit logs. (For example, in AKS, edit your cluster and go to Configuration > Logs and enable Audit.)

  2. In the Admin UI, assign the new resource to the intended user(s).

  3. As one of the users assigned to your new resource, in your desktop app, select the Update kubectl configuration option.

  4. Run the commands you want to try as examples.

  5. Access your logs and search for the term "impersonate" or your StrongDM username. For example, in AWS, go to Cloudwatch > Log Groups, search for your cluster name, and then search for your term. You should see audit records similar to the following:

    {
      "kind": "Event",
      "apiVersion": "audit.k8s.io/v1",
      "level": "Metadata",
      "auditID": "8cadb874-1ec0-4670-9996-38dc0371fdca",
      "stage": "ResponseComplete",
      "requestURI": "/api?timeout=32s",
      "verb": "get",
      "user": {
          "username": "eks-header-validation_role",
          "uid": "heptio-authenticator-aws:000000000000:ARRRRRRRRRRRRRRRRRRR",
          "groups": [
              "system:masters",
              "system:authenticated"
          ],
          "extra": {
              "accessKeyId": [
                  "ARRRRRRRRRRRRRRRRRRR"
              ],
              "arn": [
                  "arn:aws:sts::000000000000:assumed-role/eks-header-validation_role/1632846062627469349"
              ],
              "canonicalArn": [
                  "arn:aws:iam::000000000000:role/eks-header-validation_role"
              ],
              "sessionName": [
                  "1632846062627469349"
              ]
          }
      },
      "impersonatedUser": {
          "username": "[email protected]",
          "groups": [
              "product",
              "system:authenticated"
          ]
      },
      "sourceIPs": [
          "10.0.0.1"
      ],
      "userAgent": "kubectl/v1.20.4 (darwin/amd64) kubernetes/e87da0b",
      "responseStatus": {
          "metadata": {},
          "code": 200
      },
      "requestReceivedTimestamp": "2021-09-28T16:21:03.167286Z",
      "stageTimestamp": "2021-09-28T16:21:03.167566Z",
      "annotations": {
          "authorization.k8s.io/decision": "allow",
          "authorization.k8s.io/reason": "RBAC: allowed by ClusterRoleBinding \"system:discovery\" of ClusterRole \"system:discovery\" to Group \"system:authenticated\""
      }
    }

Supported Kubernetes Variants

  • Kubernetes

  • Elastic Kubernetes Service (EKS)

  • Azure Kubernetes Service (AKS)

  • Google Kubernetes Engine (GKE) (only GKE Standard mode; GKE Auto-pilot mode is not supported)

Want to see StrongDM's capabilities beyond User Impersonation mode and native logging with Kubernetes? Learn more about how it works or get a demo to see it in action.

Last updated

Was this helpful?