| title | Authentication | ||
|---|---|---|---|
| sidebar |
|
datumctl uses OAuth 2.0 and OpenID Connect (OIDC) with the PKCE extension for
secure authentication against Datum Cloud. This avoids the need to handle static
API keys directly.
Authentication involves the following commands:
datumctl auth logindatumctl auth listdatumctl auth logoutdatumctl auth get-tokendatumctl auth update-kubeconfigdatumctl auth switch
Credentials and tokens are stored securely in your operating system's default keyring.
To authenticate with Datum Cloud, use the login command:
datumctl auth login [--hostname <auth-hostname>] [--no-browser] [-v]
--hostname <auth-hostname>: (Optional) Specify the hostname of the Datum Cloud authentication server. Defaults toauth.datum.net.--no-browser: (Optional) Do not attempt to open a browser; print the login URL and use the device authorization flow (enter a user code) so you can complete login without a local callback.-v, --verbose: (Optional) Print the full ID token claims after successful login.
Running this command will:
- Attempt to open your default web browser to the Datum Cloud authentication
page (or use device authorization if
--no-browseris used). - If the browser cannot be opened automatically, it will print a URL for you to visit manually.
- Authenticate via the web page (this might involve entering your username/password or using single sign-on).
- After successful authentication, you will be redirected back to
datumctl(via a local webserver started temporarily), which completes the process.
Your credentials (including refresh tokens) are stored securely in the system keyring, associated with your user identifier (typically your email address).
Once logged in, you typically need to configure kubectl to authenticate to
Datum Cloud Kubernetes clusters using your datumctl login session. Use the
update-kubeconfig command:
datumctl auth update-kubeconfig [--kubeconfig <path>] [--project <name>] [--organization <name>]
--kubeconfig <path>: (Optional) Path to the kubeconfig file to update. Defaults to the standard location ($HOME/.kube/configor the path specified by theKUBECONFIGenvironment variable).--project <name>: Specify the Datum Cloud project name to configure access for. You can find project IDs after creating projects in Datum Cloud.--organization <name>: Specify the Datum Cloud organization name to configure access for. You can find your organization ID usingdatumctl organizations list.
Important
You must specify either --project or --organization.
This command adds or updates the necessary cluster, user, and context entries
in your kubeconfig file. The user entry will be configured to use
datumctl auth get-token --output=client.authentication.k8s.io/v1 as an exec
credential plugin. This means kubectl commands targeting this cluster will
automatically use your active datumctl login session for authentication.
To see which users you have authenticated locally, use the list command:
datumctl auth list
# Alias: datumctl auth ls
This will output a table showing the Name, Email, and Status (Active or blank)
for each set of stored credentials. The user marked Active is the one whose
credentials will be used by default for other datumctl commands and
kubectl (if configured via update-kubeconfig).
If you have logged in with multiple user accounts (visible via
datumctl auth list), you can switch which account is active using the
switch command:
datumctl auth switch <user-email>
Replace <user-email> with the email address of the user you want to make
active. This user must already be logged in.
After switching, subsequent commands that require authentication (like
datumctl organizations list or kubectl operations configured via
update-kubeconfig) will use the credentials of the newly activated user.
To remove stored credentials, use the logout command.
Log out a specific user:
datumctl auth logout <user-email>
Replace <user-email> with the email address shown in the
datumctl auth list command.
Log out all users:
datumctl auth logout --all
This removes all Datum Cloud credentials stored by datumctl in your keyring.
The get-token command retrieves the current access token for the active
authenticated user. This is primarily used internally by other tools (like
kubectl) but can be used directly if needed.
datumctl auth get-token [-o <format>]
-o, --output <format>: (Optional) Specify the output format. Defaults totoken.token: Prints the raw access token to standard output.client.authentication.k8s.io/v1: Prints a KubernetesExecCredentialJSON object containing the ID token, suitable forkubectlauthentication.
If the stored access token is expired, get-token will attempt to use the
refresh token to obtain a new one automatically.