Skip to content

Commit 36e9647

Browse files
authored
Merge pull request #51597 from aramase/aramase/d/authn-external-links
Drop links to third-party projects from authentication page
2 parents 7004a73 + 9e2daf6 commit 36e9647

File tree

1 file changed

+7
-20
lines changed

1 file changed

+7
-20
lines changed

content/en/docs/reference/access-authn-authz/authentication.md

Lines changed: 7 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -699,12 +699,8 @@ jwt:
699699
1. Egress selector configuration is not supported for calls to `issuer.url` and `issuer.discoveryURL`.
700700

701701
Kubernetes does not provide an OpenID Connect Identity Provider.
702-
You can use an existing public OpenID Connect Identity Provider (such as Google, or
703-
[others](https://connect2id.com/products/nimbus-oauth-openid-connect-sdk/openid-connect-providers)).
704-
Or, you can run your own Identity Provider, such as [dex](https://dexidp.io/),
705-
[Keycloak](https://github.com/keycloak/keycloak),
706-
CloudFoundry [UAA](https://github.com/cloudfoundry/uaa), or
707-
Tremolo Security's [OpenUnison](https://openunison.github.io/).
702+
You can use an existing public OpenID Connect Identity Provider or run your own Identity Provider
703+
that supports the OpenID Connect protocol.
708704

709705
For an identity provider to work with Kubernetes it must:
710706

@@ -719,20 +715,11 @@ For an identity provider to work with Kubernetes it must:
719715
1. Have a CA signed certificate (even if the CA is not a commercial CA or is self signed)
720716

721717
A note about requirement #3 above, requiring a CA signed certificate. If you deploy your own
722-
identity provider (as opposed to one of the cloud providers like Google or Microsoft) you MUST
723-
have your identity provider's web server certificate signed by a certificate with the `CA` flag
724-
set to `TRUE`, even if it is self signed. This is due to GoLang's TLS client implementation
725-
being very strict to the standards around certificate validation. If you don't have a CA handy,
726-
you can use the [gencert script](https://github.com/dexidp/dex/blob/master/examples/k8s/gencert.sh)
727-
from the Dex team to create a simple CA and a signed certificate and key pair. Or you can use
728-
[this similar script](https://raw.githubusercontent.com/TremoloSecurity/openunison-qs-kubernetes/master/src/main/bash/makessl.sh)
729-
that generates SHA256 certs with a longer life and larger key size.
730-
731-
Refer to setup instructions for specific systems:
732-
733-
- [UAA](https://docs.cloudfoundry.org/concepts/architecture/uaa.html)
734-
- [Dex](https://dexidp.io/docs/kubernetes/)
735-
- [OpenUnison](https://www.tremolosecurity.com/orchestra-k8s/)
718+
identity provider you MUST have your identity provider's web server certificate signed by a
719+
certificate with the `CA` flag set to `TRUE`, even if it is self signed. This is due to GoLang's
720+
TLS client implementation being very strict to the standards around certificate validation. If you
721+
don't have a CA handy, you can create a simple CA and a signed certificate and key pair using
722+
standard certificate generation tools.
736723

737724
#### Using kubectl
738725

0 commit comments

Comments
 (0)