changes made on ryan's review comments
Signed-off-by: Anjali Telang <atelang@vmware.com>
This commit is contained in:
parent
4cb0152ea1
commit
23fb84029b
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: "Pinniped v0.11.0: Easy Configurations for Active Directory, OIDC CLI workflows and more"
|
title: "Pinniped v0.11.0: Easy Configurations for Active Directory, OIDC CLI workflows and more"
|
||||||
slug: supporting-ad-oidc-workflows
|
slug: supporting-ad-oidc-workflows
|
||||||
date: 2021-07-28
|
date: 2021-08-27
|
||||||
author: Anjali Telang
|
author: Anjali Telang
|
||||||
image: https://images.unsplash.com/photo-1574090695368-bac29418e5dc?ixid=MnwxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8&ixlib=rb-1.2.1&auto=format&fit=crop&w=1350&q=80
|
image: https://images.unsplash.com/photo-1574090695368-bac29418e5dc?ixid=MnwxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8&ixlib=rb-1.2.1&auto=format&fit=crop&w=1350&q=80
|
||||||
excerpt: "With the release of v0.11.0, Pinniped offers CRDs for easy Active Directory configuration, OIDC password grant flow for CLI workflows, and Distroless images for security and performance"
|
excerpt: "With the release of v0.11.0, Pinniped offers CRDs for easy Active Directory configuration, OIDC password grant flow for CLI workflows, and Distroless images for security and performance"
|
||||||
@ -60,7 +60,7 @@ Here’s what an example configuration looks like
|
|||||||
password: "YOUR_PASSWORD"
|
password: "YOUR_PASSWORD"
|
||||||
```
|
```
|
||||||
|
|
||||||
You can also customize the userSearch and groupSearch as shown in the examples in our reference documentation [here] ({{< ref “docs/howto/configure-supervisor-with-activedirectory.md" >}})
|
You can also customize the userSearch and groupSearch as shown in the examples in our reference documentation [here] ({{< ref "docs/howto/configure-supervisor-with-activedirectory.md" >}})
|
||||||
|
|
||||||
Here is an example of what the ID token claims will look like:
|
Here is an example of what the ID token claims will look like:
|
||||||
|
|
||||||
@ -92,7 +92,7 @@ A few considerations while configuring this on the cluster:
|
|||||||
Confirm that Multi-factor authentication is not intended to be used on the cluster
|
Confirm that Multi-factor authentication is not intended to be used on the cluster
|
||||||
Pinniped CLI running on your workstation and the Pinniped Supervisor backend are trusted to handle your password
|
Pinniped CLI running on your workstation and the Pinniped Supervisor backend are trusted to handle your password
|
||||||
|
|
||||||
With the new functionality, Users initiate pinniped get kubeconfig with a new argument --upstream-identity-provider-flow=”cli_password” to indicate their intent to use Password grant auth flow for logging into the upstream OIDC provider. By default, if no argument is specified this will follow the Browser-based auth flow. This way older Pinniped CLI versions will default to using Browser-based auth and the default for older Supervisor versions with newer CLI versions will also be Browser-based authentication.
|
With the new functionality, Users initiate `pinniped get kubeconfig` with a new argument `--upstream-identity-provider-flow="cli_password"` to indicate their intent to use Password grant auth flow for logging into the upstream OIDC provider. By default, if no argument is specified this will follow the Browser-based auth flow. This way older Pinniped CLI versions will default to using Browser-based auth and the default for older Supervisor versions with newer CLI versions will also be Browser-based authentication.
|
||||||
|
|
||||||
## Distroless-based container images
|
## Distroless-based container images
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user