<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Oauth on The IT Hollow</title>
    <link>https://theithollow.com/tags/oauth/</link>
    <description>Recent content in Oauth on The IT Hollow</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 21 Jan 2020 15:15:24 +0000</lastBuildDate>
    <atom:link href="https://theithollow.com/tags/oauth/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Active Directory Authentication for Kubernetes Clusters</title>
      <link>https://theithollow.com/2020/01/21/active-directory-authentication-for-kubernetes-clusters/</link>
      <pubDate>Tue, 21 Jan 2020 15:15:24 +0000</pubDate>
      <guid>https://theithollow.com/2020/01/21/active-directory-authentication-for-kubernetes-clusters/</guid>
      <description>&lt;p&gt;You&amp;rsquo;ve stood up your Kubernetes (k8s) cluster and are really looking forward to all of your coworkers deploying containers on it. How will you get everyone logged in? Creating local service accounts and distributing KUBECONFIG files (securely), seems like a real chore. This post will show how you can use Active Directory authentication for Kubernetes Clusters.&lt;/p&gt;
&lt;p&gt;This post will use two projects, &lt;a href=&#34;https://github.com/dexidp/dex&#34;&gt;dex&lt;/a&gt; and &lt;a href=&#34;https://github.com/heptiolabs/gangway&#34;&gt;gangway&lt;/a&gt;, to perform the authentication against ldap and return the Kubernetes login information to the user&amp;rsquo;s browser. The end result will look something like the screen below. The authenticated user will receive instructions on installing the client and setting up certificates for authentication.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
