eigenstate-ipa

OpenShift Ecosystem Primer

Related docs:

  AAP INTEGRATION     EPHEMERAL ACCESS CAPABILITIES     OPENSHIFT OPERATOR USE CASES     OPENSHIFT RHOSO USE CASES     OPENSHIFT RHACM USE CASES     OPENSHIFT RHACS USE CASES     OPENSHIFT QUAY USE CASES     OPENSHIFT DEVELOPER USE CASES     DOCS MAP  

Purpose

Use this guide when OpenShift already uses Keycloak and enterprise identity, and the question is how IdM plus eigenstate.ipa changes the workflows around the cluster rather than the cluster API itself.

This is not an installation guide for OpenShift, Keycloak, or IdM. It is a framing page for the surrounding control plane:

Assumed Model

This guide assumes:

flowchart LR
    ad1["AD Domain A"] --> idm["IdM"]
    ad2["AD Domain B"] --> idm
    ad3["AD Domain C"] --> idm
    idm --> keycloak["Keycloak"]
    keycloak --> ocp["OpenShift"]
    aap["AAP + eigenstate.ipa"] --> idm
    aap --> ocp
    aap --> infra["Bastions, VMs, support services"]
    idm --> infra

The practical consequence is that OpenShift stops being the only place where platform identity decisions show up. The identity, host policy, and service-onboarding logic around the cluster becomes automatable too.

What Changes

Keycloak Stops Carrying The Whole Identity Problem

Keycloak is still the user-facing federation layer, but it no longer has to solve every enterprise identity problem on its own.

IdM can absorb the harder parts:

That matters because the OpenShift-facing login layer becomes cleaner when the ugly estate-side identity work happens upstream of it.

AAP Gets A Real Source Of Truth For Cluster-Adjacent Work

Without an IdM-backed control plane, AAP often becomes a job runner sitting on top of stale inventory, copied credentials, and guessed policy.

With eigenstate.ipa, controller workflows can use:

That is where the collection becomes operationally useful for OpenShift teams.

RHOSO Splits Operator And Tenant Identity On Purpose

RHOSO adds a useful twist to the ecosystem story because it has at least two real identity boundaries:

That makes RHOSO a good place to talk about what IdM and AAP do around the platform rather than inside it:

RHACM Turns Policy Events Into Identity-Aware Jobs

RHACM is the useful trigger layer when the platform already knows that a cluster event or policy violation happened. The job still needs a real identity boundary, though, and that is where IdM plus eigenstate.ipa matters.

The pattern is:

That makes remediation and lifecycle work safer because the job does not start from a blind shell hook. It starts from concrete enterprise state.

RHACS Makes Enforcement Operationally Viable

RHACS already does the cluster-security work: image scanning, policy enforcement, runtime detection, and network-baseline analysis. The hard part is usually the response path around those findings.

That is where the collection matters:

Quay Keeps Registry Automation From Becoming Credential Sprawl

Quay already has its own registry, mirroring, robot-account, and notification model. The hard part is usually the surrounding identity and automation path.

That is where the collection matters:

The Value Shows Up Around The Platform

The collection is not trying to replace OpenShift RBAC, cluster operators, Keystone domains, or the oc CLI.

Its value is in the surrounding workflows that are usually harder than the platform change itself:

Where The Collection Matters Most

Persona Hard thing that becomes more reasonable Main collection surfaces Start here
OpenShift cluster admin time-bounded break-glass, controller auth for support services, policy-gated maintenance user_lease, principal, keytab, hbacrule, sudo, selinuxmap, idm OpenShift Operator Use Cases
OpenShift Virtualization admin guest enrollment, temporary guest administration, targeting VMs by identity shape otp, user_lease, idm, principal, keytab OpenShift Operator Use Cases
RHOSO cloud operator maintenance windows, data-plane host access, and supporting service state stop depending on standing admin rights and guessed host policy user_lease, hbacrule, sudo, selinuxmap, otp, principal, keytab, dns, cert, vault_write OpenShift RHOSO Use Cases
RHOSO tenant operator or domain admin tenant identity stays distinct from the operator domain while service onboarding and temporary interventions remain governed user_lease, principal, dns, cert, vault_write OpenShift RHOSO Use Cases
OpenShift developer or app team internal service onboarding, coherent app bootstrap, narrower temporary elevation principal, dns, cert, vault_write, user_lease OpenShift Developer Use Cases
RHACM operator policy violations and lifecycle hooks become identity-aware AAP triggers instead of blind shell remediations principal, keytab, hbacrule, sudo, selinuxmap, user_lease, otp OpenShift RHACM Use Cases
RHACS operator security findings become governed remediation, temporary access, and onboarding flows instead of generic follow-up tickets user_lease, principal, keytab, hbacrule, sudo, selinuxmap, dns, cert, vault_write OpenShift RHACS Use Cases
Quay operator registry access, mirroring, notifications, and service onboarding stop depending on local user sprawl and long-lived shared credentials principal, keytab, dns, cert, vault_write, user_lease, hbacrule, sudo, selinuxmap OpenShift Quay Use Cases

Boundaries

This story is stronger when it stays narrow and honest.

Do not read these pages as a claim that eigenstate.ipa is:

The claim is simpler:

If Keycloak and OpenShift already sit on top of IdM-backed enterprise identity, eigenstate.ipa gives AAP a clean way to consume that identity, policy, and service lifecycle state as automation input.

Continue by topic:

If the question is still mainly about controller workflow shape rather than OpenShift itself, return to AAP INTEGRATION.