@@ -266,6 +266,27 @@ specification with :ref:`X.509 authentication <ak8so-x509>`.
266
266
projectRef:
267
267
name: my-project
268
268
269
+ Database User with |oidc| Authentication
270
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
271
+
272
+ The following example shows an ``AtlasDatabaseUser`` custom resource
273
+ specification with |oidc|.
274
+
275
+ .. code-block:: sh
276
+
277
+ apiVersion: atlas.mongodb.com/v1
278
+ kind: AtlasDatabaseUser
279
+ metadata:
280
+ name: my-database-user
281
+ spec:
282
+ roles:
283
+ - roleName: "readWriteAnyDatabase"
284
+ databaseName: "admin"
285
+ projectRef:
286
+ name: my-project
287
+ username: my-oidc-group-id/my-idp-group-name
288
+ oidcAuthType: IDP_GROUP
289
+
269
290
Parameters
270
291
----------
271
292
@@ -292,6 +313,18 @@ to customize your specifications.
292
313
If the database user authenticates with :ref:`X.509 <ak8so-x509>`,
293
314
this value must be ``\$external``.
294
315
316
+ .. setting:: spec.oidcAuthType
317
+
318
+ *Type*: string
319
+
320
+ *Conditional*
321
+
322
+ |oidc| method by which the database authenticates the
323
+ provided :setting:`spec.username`.
324
+
325
+ If the database user authenticates with :manual:`OpenID Connect
326
+ </core/security-oidc>`, this value must be ``IDP_GROUP``.
327
+
295
328
.. setting:: spec.passwordSecretRef
296
329
297
330
*Type*: string
@@ -359,6 +392,10 @@ to customize your specifications.
359
392
Human-readable label that identifies the user needed to authenticate
360
393
to the MongoDB database or collection.
361
394
395
+ If the database user authenticates with :manual:`OpenID Connect
396
+ </core/security-oidc>`, this value must be your |service| |oidc|
397
+ |idp| followed by a forward slash ``/`` and your |idp| group name.
398
+
362
399
.. setting:: spec.x509Type
363
400
364
401
*Type*: string
0 commit comments