Skip to main content
Glama
rbac.yaml657 B
# RBAC ClusterRoleBinding for mcp user with OIDC authentication # # IMPORTANT: This requires Kubernetes API server to be configured with OIDC: # --oidc-issuer-url=https://keycloak.127-0-0-1.sslip.io:8443/realms/openshift # --oidc-username-claim=preferred_username # # Without OIDC configuration, this binding will not work. # apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: oidc-mcp-cluster-admin roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cluster-admin subjects: - apiGroup: rbac.authorization.k8s.io kind: User name: https://keycloak.127-0-0-1.sslip.io:8443/realms/openshift#mcp

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/containers/kubernetes-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server