What is K9S OpenID Connect (OIDC)
K9S is the streamlined terminal UI for managing Kubernetes clusters. OIDC is an identity layer built on OAuth 2.0. When you integrate OIDC into K9S, you bind authentication to a trusted identity provider. That means you can use Single Sign-On (SSO) with providers like Google, Azure AD, Okta, or Keycloak — directly within your Kubernetes workflows.
Why Use OIDC with K9S
- Strong authentication tied to existing identity systems
- Automatic token refresh without manual kubectl hacks
- Fine-grained RBAC mapping based on OIDC claims
- Reduced risk from leaked, long-lived kubeconfig tokens
How It Works
Your Kubernetes API server must support OIDC. You configure it with flags such as:
--oidc-issuer-url=https://accounts.example.com
--oidc-client-id=kubernetes
--oidc-username-claim=email
--oidc-groups-claim=groups
K9S pulls credentials from the same kubeconfig context that uses OIDC. When you log in, the terminal triggers the OAuth flow. The kubeconfig stores short-lived tokens. K9S uses them transparently.