<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>How-to Guides for Configuring Concierge on Pinniped</title><link>https://deploy-preview-3014--pinniped-dev.netlify.app/docs/howto/concierge/</link><description>Recent content in How-to Guides for Configuring Concierge on Pinniped</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><atom:link href="https://deploy-preview-3014--pinniped-dev.netlify.app/docs/howto/concierge/index.xml" rel="self" type="application/rss+xml"/><item><title>Configure the Pinniped Concierge to validate JWT tokens</title><link>https://deploy-preview-3014--pinniped-dev.netlify.app/docs/howto/concierge/configure-concierge-jwt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-3014--pinniped-dev.netlify.app/docs/howto/concierge/configure-concierge-jwt/</guid><description>The Concierge can validate JSON Web Tokens (JWTs), which are commonly issued by OpenID Connect (OIDC) identity providers.
This guide shows you how to use this capability without the Pinniped Supervisor. This is most useful if you have only a single cluster and want to authenticate to it via an existing OIDC provider.
If you have multiple clusters, you may want to install and configure the Pinniped Supervisor. Then you can configure the Concierge to use the Supervisor for authentication instead of following the guide below.</description></item><item><title>Configure the Pinniped Concierge to validate JWT tokens issued by the Pinniped Supervisor</title><link>https://deploy-preview-3014--pinniped-dev.netlify.app/docs/howto/concierge/configure-concierge-supervisor-jwt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-3014--pinniped-dev.netlify.app/docs/howto/concierge/configure-concierge-supervisor-jwt/</guid><description>The Concierge can validate JSON Web Tokens (JWTs), which are commonly issued by OpenID Connect (OIDC) identity providers.
This guide shows you how to use this capability in conjunction with the Pinniped Supervisor. Each FederationDomain defined in a Pinniped Supervisor acts as an OIDC issuer. By installing the Pinniped Concierge on multiple Kubernetes clusters, and by configuring each cluster&amp;rsquo;s Concierge as described below to trust JWT tokens from a single Supervisor&amp;rsquo;s FederationDomain, your clusters' users may safely use their identity across all of those clusters.</description></item><item><title>Configure the Pinniped Concierge to validate webhook tokens</title><link>https://deploy-preview-3014--pinniped-dev.netlify.app/docs/howto/concierge/configure-concierge-webhook/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-3014--pinniped-dev.netlify.app/docs/howto/concierge/configure-concierge-webhook/</guid><description>The Concierge can validate arbitrary tokens via an external webhook endpoint using the same validation process as Kubernetes itself.
Prerequisites Before starting, you should have the command-line tool installed locally and Concierge running in your cluster.
You should also have a custom TokenReview webhook endpoint:
Your webhook endpoint must handle the authentication.k8s.io/v1 TokenReview API.
Your webhook must be accessible from the Concierge pod over HTTPS.
Create a WebhookAuthenticator Create a WebhookAuthenticator describing how to validate tokens using your webhook:</description></item></channel></rss>