@@ -699,12 +699,8 @@ jwt:
6996991. Egress selector configuration is not supported for calls to `issuer.url` and `issuer.discoveryURL`.
700700
701701Kubernetes does not provide an OpenID Connect Identity Provider.
702- You can use an existing public OpenID Connect Identity Provider (such as Google, or
703- [others](https://connect2id.com/products/nimbus-oauth-openid-connect-sdk/openid-connect-providers)).
704- Or, you can run your own Identity Provider, such as [dex](https://dexidp.io/),
705- [Keycloak](https://github.com/keycloak/keycloak),
706- CloudFoundry [UAA](https://github.com/cloudfoundry/uaa), or
707- Tremolo Security's [OpenUnison](https://openunison.github.io/).
702+ You can use an existing public OpenID Connect Identity Provider or run your own Identity Provider
703+ that supports the OpenID Connect protocol.
708704
709705For an identity provider to work with Kubernetes it must :
710706
@@ -719,20 +715,11 @@ For an identity provider to work with Kubernetes it must:
7197151. Have a CA signed certificate (even if the CA is not a commercial CA or is self signed)
720716
721717A note about requirement # 3 above, requiring a CA signed certificate. If you deploy your own
722- identity provider (as opposed to one of the cloud providers like Google or Microsoft) you MUST
723- have your identity provider's web server certificate signed by a certificate with the `CA` flag
724- set to `TRUE`, even if it is self signed. This is due to GoLang's TLS client implementation
725- being very strict to the standards around certificate validation. If you don't have a CA handy,
726- you can use the [gencert script](https://github.com/dexidp/dex/blob/master/examples/k8s/gencert.sh)
727- from the Dex team to create a simple CA and a signed certificate and key pair. Or you can use
728- [this similar script](https://raw.githubusercontent.com/TremoloSecurity/openunison-qs-kubernetes/master/src/main/bash/makessl.sh)
729- that generates SHA256 certs with a longer life and larger key size.
730-
731- Refer to setup instructions for specific systems :
732-
733- - [UAA](https://docs.cloudfoundry.org/concepts/architecture/uaa.html)
734- - [Dex](https://dexidp.io/docs/kubernetes/)
735- - [OpenUnison](https://www.tremolosecurity.com/orchestra-k8s/)
718+ identity provider you MUST have your identity provider's web server certificate signed by a
719+ certificate with the `CA` flag set to `TRUE`, even if it is self signed. This is due to GoLang's
720+ TLS client implementation being very strict to the standards around certificate validation. If you
721+ don't have a CA handy, you can create a simple CA and a signed certificate and key pair using
722+ standard certificate generation tools.
736723
737724# ### Using kubectl
738725
0 commit comments