aws eks associate-identity-provider-config

Associate an identity provider configuration to a cluster. If you want to authenticate identities using an identity provider, you can create an identity provider configuration and associate it to your cluster. After configuring authentication to your cluster you can create Kubernetes roles and clusterroles to assign permissions to the roles, and then bind the roles to the identities using Kubernetes rolebindings and clusterrolebindings. For more information see Using RBAC Authorization in the Kubernetes documentation

Options

NameDescription
--cluster-name <string>The name of the cluster to associate the configuration to
--oidc <structure>An object that represents an OpenID Connect (OIDC) identity provider configuration
--tags <map>The metadata to apply to the configuration to assist with categorization and organization. Each tag consists of a key and an optional value, both of which you define
--client-request-token <string>Unique, case-sensitive identifier that you provide to ensure the idempotency of the request
--cli-input-json <string>Performs service operation based on the JSON string provided. The JSON string follows the format provided by ``--generate-cli-skeleton``. If other arguments are provided on the command line, the CLI values will override the JSON-provided values. It is not possible to pass arbitrary binary values using a JSON-provided value as the string will be taken literally
--generate-cli-skeleton <string>Prints a JSON skeleton to standard output without sending an API request. If provided with no value or the value ``input``, prints a sample input JSON that can be used as an argument for ``--cli-input-json``. If provided with the value ``output``, it validates the command inputs and returns a sample output JSON for that command