Closed EPNSED closed 11 months ago
@EPNSED first, ensure you are using configExistingSecretKey
NOT configexistingSecretKey
(capitalization matters).
Second, the secret should contain the CONTENT of the dex config
, not the "config:" part itself.
Also, you might not know this, but there is a special stringData
write-only field in Secrets (which kubectl
automatically translates to base64 encoded fields in data
), so you could use something like this to save time:
apiVersion: v1
kind: Secret
metadata:
name: my-dex-connector-secret
namespace: kubeflow
type: Opaque
stringData:
SecretKey: |
issuer : "https://xxxx.rs.gsu.edu/auth/realms/xxxx"
clientID : "kubeflow"
clientSecret : "xxxx-xxx-xxx-xxxx"
redirectURI : "https://xxxx.rs.gsu.edu:8443/dex/callback"
Thanks @thesuperzapper. It worked. Do you have an architecture diagram somewhere? Although authentication is successful, I'm still getting internal server error (500 error). I'm trying to debug this. It would be very useful to have an architecture diagram. Please feel free to close this ticket though. Authentication works now
I'm trying to follow the documentation provided here, I'm trying to connect to our local keycloak instance
https://www.deploykf.org/guides/platform/deploykf-authentication/#external-identity-providers
I was able to get everything working if I put everything in the value file as plain text, however, I'm having a hard time using the secrets. I apologize if this is a basic question, but I'm having a hard time here.
Documentation has the following,
This is how I create the secret
Then I used the value created from the above step and created a key using the following definition
I added the following to the values.ymal file
What am I doing wrong here?