Skip to content

Commit f5132af

Browse files
timhughesTim Hughes
authored andcommitted
Updates links to Dex
1 parent d63933d commit f5132af

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

content/en/docs/reference/access-authn-authz/authentication.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -328,7 +328,7 @@ tokens on behalf of another.
328328
Kubernetes does not provide an OpenID Connect Identity Provider.
329329
You can use an existing public OpenID Connect Identity Provider (such as Google, or
330330
[others](https://connect2id.com/products/nimbus-oauth-openid-connect-sdk/openid-connect-providers)).
331-
Or, you can run your own Identity Provider, such as CoreOS [dex](https://github.com/coreos/dex),
331+
Or, you can run your own Identity Provider, such as [dex](https://dexidp.io/),
332332
[Keycloak](https://github.com/keycloak/keycloak),
333333
CloudFoundry [UAA](https://github.com/cloudfoundry/uaa), or
334334
Tremolo Security's [OpenUnison](https://github.com/tremolosecurity/openunison).
@@ -339,13 +339,13 @@ For an identity provider to work with Kubernetes it must:
339339
2. Run in TLS with non-obsolete ciphers
340340
3. Have a CA signed certificate (even if the CA is not a commercial CA or is self signed)
341341

342-
A note about requirement #3 above, requiring a CA signed certificate. If you deploy your own identity provider (as opposed to one of the cloud providers like Google or Microsoft) you MUST have your identity provider's web server certificate signed by a certificate with the `CA` flag set to `TRUE`, even if it is self signed. This is due to GoLang's TLS client implementation being very strict to the standards around certificate validation. If you don't have a CA handy, you can use [this script](https://github.com/coreos/dex/blob/1ee5920c54f5926d6468d2607c728b71cfe98092/examples/k8s/gencert.sh) from the CoreOS team to create a simple CA and a signed certificate and key pair.
342+
A note about requirement #3 above, requiring a CA signed certificate. If you deploy your own identity provider (as opposed to one of the cloud providers like Google or Microsoft) you MUST have your identity provider's web server certificate signed by a certificate with the `CA` flag set to `TRUE`, even if it is self signed. This is due to GoLang's TLS client implementation being very strict to the standards around certificate validation. If you don't have a CA handy, you can use [this script](https://github.com/dexidp/dex/blob/master/examples/k8s/gencert.sh) from the Dex team to create a simple CA and a signed certificate and key pair.
343343
Or you can use [this similar script](https://raw.githubusercontent.com/TremoloSecurity/openunison-qs-kubernetes/master/src/main/bash/makessl.sh) that generates SHA256 certs with a longer life and larger key size.
344344

345345
Setup instructions for specific systems:
346346

347347
- [UAA](https://docs.cloudfoundry.org/concepts/architecture/uaa.html)
348-
- [Dex](https://github.com/dexidp/dex/blob/master/Documentation/kubernetes.md)
348+
- [Dex](https://dexidp.io/docs/kubernetes/)
349349
- [OpenUnison](https://www.tremolosecurity.com/orchestra-k8s/)
350350

351351
#### Using kubectl

0 commit comments

Comments
 (0)