Related docs:
AAP INTEGRATION EPHEMERAL ACCESS CAPABILITIES OPENSHIFT OPERATOR USE CASES OPENSHIFT RHOSO USE CASES OPENSHIFT RHACM USE CASES OPENSHIFT RHACS USE CASES OPENSHIFT QUAY USE CASES OPENSHIFT DEVELOPER USE CASES DOCS MAP
Use this guide when OpenShift already uses Keycloak and enterprise identity,
and the question is how IdM plus eigenstate.ipa changes the workflows around
the cluster rather than the cluster API itself.
This is not an installation guide for OpenShift, Keycloak, or IdM. It is a framing page for the surrounding control plane:
This guide assumes:
eigenstate.ipa exposes the IdM state that those workflows needflowchart LR
ad1["AD Domain A"] --> idm["IdM"]
ad2["AD Domain B"] --> idm
ad3["AD Domain C"] --> idm
idm --> keycloak["Keycloak"]
keycloak --> ocp["OpenShift"]
aap["AAP + eigenstate.ipa"] --> idm
aap --> ocp
aap --> infra["Bastions, VMs, support services"]
idm --> infra
The practical consequence is that OpenShift stops being the only place where platform identity decisions show up. The identity, host policy, and service-onboarding logic around the cluster becomes automatable too.
Keycloak is still the user-facing federation layer, but it no longer has to solve every enterprise identity problem on its own.
IdM can absorb the harder parts:
That matters because the OpenShift-facing login layer becomes cleaner when the ugly estate-side identity work happens upstream of it.
Without an IdM-backed control plane, AAP often becomes a job runner sitting on top of stale inventory, copied credentials, and guessed policy.
With eigenstate.ipa, controller workflows can use:
That is where the collection becomes operationally useful for OpenShift teams.
RHOSO adds a useful twist to the ecosystem story because it has at least two real identity boundaries:
That makes RHOSO a good place to talk about what IdM and AAP do around the platform rather than inside it:
RHACM is the useful trigger layer when the platform already knows that a
cluster event or policy violation happened. The job still needs a real
identity boundary, though, and that is where IdM plus eigenstate.ipa matters.
The pattern is:
eigenstate.ipa checks whether the identity, policy, DNS, certificate, or
temporary access window is actually readyThat makes remediation and lifecycle work safer because the job does not start from a blind shell hook. It starts from concrete enterprise state.
RHACS already does the cluster-security work: image scanning, policy enforcement, runtime detection, and network-baseline analysis. The hard part is usually the response path around those findings.
That is where the collection matters:
Quay already has its own registry, mirroring, robot-account, and notification model. The hard part is usually the surrounding identity and automation path.
That is where the collection matters:
The collection is not trying to replace OpenShift RBAC, cluster operators,
Keystone domains, or the oc CLI.
Its value is in the surrounding workflows that are usually harder than the platform change itself:
| Persona | Hard thing that becomes more reasonable | Main collection surfaces | Start here |
|---|---|---|---|
| OpenShift cluster admin | time-bounded break-glass, controller auth for support services, policy-gated maintenance | user_lease, principal, keytab, hbacrule, sudo, selinuxmap, idm |
OpenShift Operator Use Cases |
| OpenShift Virtualization admin | guest enrollment, temporary guest administration, targeting VMs by identity shape | otp, user_lease, idm, principal, keytab |
OpenShift Operator Use Cases |
| RHOSO cloud operator | maintenance windows, data-plane host access, and supporting service state stop depending on standing admin rights and guessed host policy | user_lease, hbacrule, sudo, selinuxmap, otp, principal, keytab, dns, cert, vault_write |
OpenShift RHOSO Use Cases |
| RHOSO tenant operator or domain admin | tenant identity stays distinct from the operator domain while service onboarding and temporary interventions remain governed | user_lease, principal, dns, cert, vault_write |
OpenShift RHOSO Use Cases |
| OpenShift developer or app team | internal service onboarding, coherent app bootstrap, narrower temporary elevation | principal, dns, cert, vault_write, user_lease |
OpenShift Developer Use Cases |
| RHACM operator | policy violations and lifecycle hooks become identity-aware AAP triggers instead of blind shell remediations | principal, keytab, hbacrule, sudo, selinuxmap, user_lease, otp |
OpenShift RHACM Use Cases |
| RHACS operator | security findings become governed remediation, temporary access, and onboarding flows instead of generic follow-up tickets | user_lease, principal, keytab, hbacrule, sudo, selinuxmap, dns, cert, vault_write |
OpenShift RHACS Use Cases |
| Quay operator | registry access, mirroring, notifications, and service onboarding stop depending on local user sprawl and long-lived shared credentials | principal, keytab, dns, cert, vault_write, user_lease, hbacrule, sudo, selinuxmap |
OpenShift Quay Use Cases |
This story is stronger when it stays narrow and honest.
Do not read these pages as a claim that eigenstate.ipa is:
The claim is simpler:
If Keycloak and OpenShift already sit on top of IdM-backed enterprise identity,
eigenstate.ipa gives AAP a clean way to consume that identity, policy, and
service lifecycle state as automation input.
Continue by topic:
If the question is still mainly about controller workflow shape rather than OpenShift itself, return to AAP INTEGRATION.