Skip to content
Projects
Groups
Snippets
Help
Loading...
Sign in
Toggle navigation
D
dex
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Commits
Issue Boards
Open sidebar
go
dex
Commits
337bbe5f
Commit
337bbe5f
authored
Jan 26, 2019
by
Takashi Okamoto
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
fix typos.
parent
1b7b3515
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
9 additions
and
12 deletions
+9
-12
kubelogin-activedirectory.md
Documentation/connectors/kubelogin-activedirectory.md
+9
-9
ldap.md
Documentation/connectors/ldap.md
+0
-3
No files found.
Documentation/connectors/kubelogin-activedirectory.md
View file @
337bbe5f
...
...
@@ -40,10 +40,10 @@ subjectAltName = @alt_names
DNS.1 = dex.example.com
```
Please replace dex.example.com to your favorit hostname.
Please replace dex.example.com to your favorit
e
hostname.
Generate certificate and private key by following command.
```
```
console
$
openssl req
-new
-x509
-sha256
-days
3650
-newkey
rsa:4096
-extensions
v3_req
-out
openid-ca.pem
-keyout
openid-key.pem
-config
req.cnf
-subj
"/CN=kube-ca"
-nodes
$
ls
openid
*
openid-ca.pem openid-key.pem
...
...
@@ -53,7 +53,7 @@ openid-ca.pem openid-key.pem
Modify following host, bindDN and bindPW in examples/config-ad-kubelogin.yaml.
```
```
yaml
connectors
:
-
type
:
ldap
name
:
OpenLDAP
...
...
@@ -99,27 +99,27 @@ See https://kubernetes.io/docs/reference/access-authn-authz/authentication/ for
Create context for dex authentication:
```
```
console
$
kubectl config set-context oidc-ctx
--cluster
=
cluster.local
--user
=
test
$ kubectl config set-credentials test
$
kubectl config set-credentials
test
\
--auth-provider
=
oidc
\
--auth-provider-arg
=
idp-issuer-url
=
https://dex.example.com:32000/dex
\
--auth-provider-arg
=
client-id
=
kubernetes
\
--auth-provider-arg
=
client-secret
=
ZXhhbXBsZS1hcHAtc2VjcmV0
\
--auth-provider-arg
=
idp-certificate-authority-data
=
$(
base64
-w
0 openid-ca.pem
)
\
"--auth-provider-arg=extra-scopes=
offline_access openid profile email group"
--auth-provider-arg
=
extra-scopes
=
"
offline_access openid profile email group"
$
kubectl config use-context oidc-ctx
```
Please confirm idp-issuer-url, cl
ei
nt-id, client-secret and idp-certificate-authority-data value is same as config-ad-kubelogin.yaml's value.
Please confirm idp-issuer-url, cl
ie
nt-id, client-secret and idp-certificate-authority-data value is same as config-ad-kubelogin.yaml's value.
Then run kubelogin:
```
```
console
$
kubelogin
```
Access http://localhost:8000 by web browser and login with your AD account(eg. test@example.com) and password.
Access http://localhost:8000 by web browser and login with your AD account
(eg. test@example.com) and password.
After login and grant, you have following token in ~/.kube/config:
```
...
...
Documentation/connectors/ldap.md
View file @
337bbe5f
...
...
@@ -253,7 +253,6 @@ groupSearch:
The following configuration will allow the LDAP connector to search a FreeIPA directory using an LDAP filter.
```
yaml
connectors
:
-
type
:
ldap
id
:
ldap
...
...
@@ -290,7 +289,6 @@ If the search finds an entry, it will attempt to use the provided password to bi
The following configuration will allow the LDAP connector to search a Active Directory using an LDAP filter.
```
yaml
connectors
:
-
type
:
ldap
name
:
ActiveDirectory
...
...
@@ -320,6 +318,5 @@ connectors:
userAttr
:
DN
groupAttr
:
member
nameAttr
:
cn
```
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment