@@ -699,12 +699,8 @@ jwt:
699
699
1. Egress selector configuration is not supported for calls to `issuer.url` and `issuer.discoveryURL`.
700
700
701
701
Kubernetes does not provide an OpenID Connect Identity Provider.
702
- You can use an existing public OpenID Connect Identity Provider (such as Google, or
703
- [others](https://connect2id.com/products/nimbus-oauth-openid-connect-sdk/openid-connect-providers)).
704
- Or, you can run your own Identity Provider, such as [dex](https://dexidp.io/),
705
- [Keycloak](https://github.com/keycloak/keycloak),
706
- CloudFoundry [UAA](https://github.com/cloudfoundry/uaa), or
707
- Tremolo Security's [OpenUnison](https://openunison.github.io/).
702
+ You can use an existing public OpenID Connect Identity Provider or run your own Identity Provider
703
+ that supports the OpenID Connect protocol.
708
704
709
705
For an identity provider to work with Kubernetes it must :
710
706
@@ -719,20 +715,11 @@ For an identity provider to work with Kubernetes it must:
719
715
1. Have a CA signed certificate (even if the CA is not a commercial CA or is self signed)
720
716
721
717
A note about requirement # 3 above, requiring a CA signed certificate. If you deploy your own
722
- identity provider (as opposed to one of the cloud providers like Google or Microsoft) you MUST
723
- have your identity provider's web server certificate signed by a certificate with the `CA` flag
724
- set to `TRUE`, even if it is self signed. This is due to GoLang's TLS client implementation
725
- being very strict to the standards around certificate validation. If you don't have a CA handy,
726
- you can use the [gencert script](https://github.com/dexidp/dex/blob/master/examples/k8s/gencert.sh)
727
- from the Dex team to create a simple CA and a signed certificate and key pair. Or you can use
728
- [this similar script](https://raw.githubusercontent.com/TremoloSecurity/openunison-qs-kubernetes/master/src/main/bash/makessl.sh)
729
- that generates SHA256 certs with a longer life and larger key size.
730
-
731
- Refer to setup instructions for specific systems :
732
-
733
- - [UAA](https://docs.cloudfoundry.org/concepts/architecture/uaa.html)
734
- - [Dex](https://dexidp.io/docs/kubernetes/)
735
- - [OpenUnison](https://www.tremolosecurity.com/orchestra-k8s/)
718
+ identity provider you MUST have your identity provider's web server certificate signed by a
719
+ certificate with the `CA` flag set to `TRUE`, even if it is self signed. This is due to GoLang's
720
+ TLS client implementation being very strict to the standards around certificate validation. If you
721
+ don't have a CA handy, you can create a simple CA and a signed certificate and key pair using
722
+ standard certificate generation tools.
736
723
737
724
# ### Using kubectl
738
725
0 commit comments