mirror of
https://github.com/pomerium/pomerium.git
synced 2025-08-02 08:19:23 +02:00
New Topic Page: Original Request Context (#2569)
* init original context doc * copy edit * init Service Account page * update and expand user context article * fix header name * copy edit * update response path through Pomerium * clarify SA name is user in policy creation
This commit is contained in:
parent
11939fdc8a
commit
62ac580a57
10 changed files with 177 additions and 0 deletions
BIN
docs/enterprise/img/add-service-account.png
Normal file
BIN
docs/enterprise/img/add-service-account.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 44 KiB |
BIN
docs/enterprise/img/create-impersonated-service-account.png
Normal file
BIN
docs/enterprise/img/create-impersonated-service-account.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 16 KiB |
BIN
docs/enterprise/img/create-service-account.png
Normal file
BIN
docs/enterprise/img/create-service-account.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 15 KiB |
BIN
docs/enterprise/img/service-account-jwt.png
Normal file
BIN
docs/enterprise/img/service-account-jwt.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 41 KiB |
BIN
docs/enterprise/img/service-account-policy.png
Normal file
BIN
docs/enterprise/img/service-account-policy.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 60 KiB |
BIN
docs/enterprise/img/user-id.png
Normal file
BIN
docs/enterprise/img/user-id.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 17 KiB |
50
docs/enterprise/service-accounts.md
Normal file
50
docs/enterprise/service-accounts.md
Normal file
|
@ -0,0 +1,50 @@
|
|||
---
|
||||
title: Service Accounts
|
||||
sidebarDepth: 1
|
||||
description: Protect internal machine resources with service accounts.
|
||||
---
|
||||
|
||||
# Service Accounts
|
||||
|
||||
Service accounts offer a protected and standardized method of authenticating machine-to-machine communication between services protected by Pomerium.
|
||||
|
||||
## Create a Service Account
|
||||
|
||||
::: tip
|
||||
Before you begin, confirm you are in the correct Namespace. A service account can only be used in the Namespace it was created in, including its children Namespaces.
|
||||
:::
|
||||
|
||||
1. From the main menu, select **Service Accounts** under **CONFIGURE**. Click the **+ ADD SERVICE ACCOUNT** button:
|
||||
|
||||

|
||||
|
||||
1. Service accounts can be unique and exist only for Pomerium, or impersonate directory users from your IdP.
|
||||
|
||||
::::: tabs
|
||||
:::: tab Unique
|
||||
Give the user a unique ID. Consider referencing the Namespace you're creating it under, for easier reference later. Optionally set an expiration date:
|
||||
|
||||

|
||||
|
||||
The user ID set here corresponds to the `User` criteria when editing a policy.
|
||||
::::
|
||||
:::: tab Impersonated
|
||||
You can find your User ID by going to the special endpoint `/.pomerium`, or selecting **Logout** under your user in the upper right hand corner (this will not immediately log you out):
|
||||
|
||||

|
||||
|
||||
Copy the User ID and paste it into the **User ID** field in the **Add Service Account** modal. The lookahead search should show you the user name You can also optionally set an expiration date:
|
||||
|
||||

|
||||
::::
|
||||
:::::
|
||||
|
||||
1. After you click **Submit**, the modal presents the Java Web Token (**JWT**) for the service account. Temporarily save it somewhere secure, as you will not be able to view it again:
|
||||
|
||||

|
||||
|
||||
This JWT must be added to your application configuration to enable direct communication.
|
||||
|
||||
1. Edit or create policies to give the service account access to the internal service:
|
||||
|
||||

|
Loading…
Add table
Add a link
Reference in a new issue