Skip to content

Commit a918964

Browse files
meagancojocargithub-actions[bot]CamSoper
authored
Add Pulumi OIDC token type availability by Pulumi edition (#16149)
* Add OIDC token type availability by Pulumi edition This commit clarifies which OIDC token types (personal, organization, team) are available for each Pulumi edition (Individual, Team, Enterprise/Business Critical). Changes: - Added "Token types by edition" section to main OIDC client page - Updated GitHub, GKE, and EKS OIDC guides with info notes linking to token types - Clarified that examples show specific token types but others may be available Fixes #16019 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-authored-by: Meagan <[email protected]> * Fix OIDC documentation issues - Fix parameter name: requested_token_type → requested-token-type - Add missing comma in TypeScript syntax (kubernetes-eks.md:189) - Fix capitalization: Github → GitHub - Add missing newline at end of github.md Co-authored-by: Meagan <[email protected]> * Remove unnecessary newline at the end of the GitHub OIDC configuration document --------- Co-authored-by: claude[bot] <41898282+claude[bot]@users.noreply.github.com> Co-authored-by: Meagan <[email protected]> Co-authored-by: Cam <[email protected]>
1 parent 830bc04 commit a918964

File tree

4 files changed

+23
-1
lines changed

4 files changed

+23
-1
lines changed

content/docs/administration/access-identity/oidc-client/_index.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,16 @@ Pulumi supports establishing trust relationships with third party OIDC providers
2424

2525
For third party services that have capabilities to issue OIDC id_tokens, it is possible to register them as a trusted OIDC Issuer to leverage these tokens to be exchanged by a short-lived Pulumi access token automatically to avoid having to store hardcoded credentials.
2626

27+
## Token types by edition
28+
29+
The available OIDC token types vary depending on your Pulumi edition:
30+
31+
- **Individual**: `personal` tokens only
32+
- **Team**: `personal` and `organization` tokens
33+
- **Enterprise and Business Critical**: `personal`, `organization`, and `team` tokens
34+
35+
When configuring authorization policies and requesting tokens, ensure you select a token type that is available for your edition.
36+
2737
## Configuring trust relationships
2838

2939
### Register the OIDC issuer

content/docs/administration/access-identity/oidc-client/github.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,10 @@ aliases:
1717

1818
This document outlines the steps required to configure Pulumi to accept Github id_tokens to be exchanged by Organization access tokens.
1919

20+
{{< notes type="info" >}}
21+
This guide demonstrates using `organization` tokens. Depending on your [Pulumi edition](/docs/pulumi-cloud/access-management/oidc-client/#token-types-by-edition), you may also use `personal` or `team` tokens by adjusting the token type in the authorization policies and the `requested-token-type` parameter.
22+
{{< /notes >}}
23+
2024
## Prerequisites
2125

2226
* You must be an admin of your Pulumi organization.

content/docs/administration/access-identity/oidc-client/kubernetes-eks.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,10 @@ aliases:
2121

2222
This document outlines the steps required to configure Pulumi to accept Elastic Kubernetes Service (EKS) id_tokens to be exchanged for a personal access token. With this configuration, Kubernetes pods authenticate to Pulumi Cloud using OIDC tokens issued by EKS.
2323

24+
{{< notes type="info" >}}
25+
This guide demonstrates using `personal` tokens. Depending on your [Pulumi edition](/docs/pulumi-cloud/access-management/oidc-client/#token-types-by-edition), you may also use `organization` or `team` tokens by adjusting the token type in the authorization policies and the `requested-token-type` parameter.
26+
{{< /notes >}}
27+
2428
## Prerequisites
2529

2630
* You must be an admin of your Pulumi organization.
@@ -184,7 +188,7 @@ const job = new kubernetes.batch.v1.Job("runner", {
184188
spec: {
185189
template: {
186190
spec: {
187-
serviceAccountName: "pulumi-service-account"
191+
serviceAccountName: "pulumi-service-account",
188192
containers: [{
189193
name: "runner",
190194
image: "pulumi/pulumi:latest",

content/docs/administration/access-identity/oidc-client/kubernetes-gke.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,10 @@ This document outlines the steps required to configure Pulumi to accept Google K
1919

2020
See ["Bound Tokens"](https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-bound-service-account-tokens) for more background.
2121

22+
{{< notes type="info" >}}
23+
This guide demonstrates using `organization` tokens. Depending on your [Pulumi edition](/docs/pulumi-cloud/access-management/oidc-client/#token-types-by-edition), you may also use `personal` or `team` tokens by adjusting the token type in the authorization policies and the `requested-token-type` parameter.
24+
{{< /notes >}}
25+
2226
## Prerequisites
2327

2428
* You must be an admin of your Pulumi organization.

0 commit comments

Comments
 (0)