The usual kubeconfig friction
OKE access often requires users to understand OCI CLI setup, local config files, tenancy identifiers, regions, profiles, IAM policy, and cluster endpoint reachability. For platform teams, that creates repetitive onboarding work and inconsistent access patterns.
A governed platform should make authorized access easier without weakening the network or identity model.
What Infragate changes
Infragate can generate kubectl-ready kubeconfig for authorized users from the web portal. The user does not need to configure OCI CLI locally just to get started with cluster access.
Authorization still matters. Users see and download kubeconfig only for clusters they are allowed to access, and network reachability still follows the OKE API endpoint design selected by the customer.
What still must be designed
- Which users and roles may access which clusters.
- Whether API endpoints are private or restricted to VPN, runner, and corporate CIDRs.
- How short-lived or long-lived access credentials are governed.
- How access events appear in Activity history or audit workflows.
- How incident response removes access when a user changes role or leaves a team.
Why this helps platform teams
Removing local OCI CLI setup from the common path reduces support tickets and makes the user experience closer to an internal developer platform than a cloud operations handoff.
Instead of every engineer learning the mechanics of OCI profile configuration, platform teams can centralize the access workflow and document the smaller set of network and role rules that matter.
Infragate fit
Kubeconfig delivery in Infragate sits alongside cluster lifecycle management, templates, limits, approvals, BYON networking, cost visibility, and Activity history. It is not a standalone file download feature; it is part of governed OKE operations.