docs: rename docs/reference to docs/topics (#1182)
* docs: rename docs/reference to docs/topics Signed-off-by: Bobby DeSimone <bobbydesimone@gmail.com>
|
@ -107,8 +107,8 @@ module.exports = {
|
||||||
"identity-providers/",
|
"identity-providers/",
|
||||||
"identity-providers/azure",
|
"identity-providers/azure",
|
||||||
"identity-providers/cognito",
|
"identity-providers/cognito",
|
||||||
"identity-providers/gitlab",
|
|
||||||
"identity-providers/github",
|
"identity-providers/github",
|
||||||
|
"identity-providers/gitlab",
|
||||||
"identity-providers/google",
|
"identity-providers/google",
|
||||||
"identity-providers/okta",
|
"identity-providers/okta",
|
||||||
"identity-providers/one-login",
|
"identity-providers/one-login",
|
||||||
|
@ -128,19 +128,19 @@ module.exports = {
|
||||||
],
|
],
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
title: "Reference",
|
title: "Topics",
|
||||||
collapsable: true,
|
collapsable: true,
|
||||||
path: "/docs/reference/",
|
path: "/docs/topics/",
|
||||||
type: "group",
|
type: "group",
|
||||||
collapsable: false,
|
collapsable: false,
|
||||||
sidebarDepth: 1,
|
sidebarDepth: 1,
|
||||||
children: [
|
children: [
|
||||||
"reference/certificates",
|
"topics/certificates",
|
||||||
"reference/data-storage",
|
"topics/data-storage",
|
||||||
"reference/impersonation",
|
"topics/getting-users-identity",
|
||||||
"reference/programmatic-access",
|
"topics/impersonation",
|
||||||
"reference/getting-users-identity",
|
"topics/production-deployment",
|
||||||
"reference/production-deployment",
|
"topics/programmatic-access",
|
||||||
],
|
],
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
|
@ -158,6 +158,7 @@ module.exports = {
|
||||||
"cloud-run",
|
"cloud-run",
|
||||||
"istio",
|
"istio",
|
||||||
"kubernetes",
|
"kubernetes",
|
||||||
|
"kubernetes-dashboard",
|
||||||
"local-oidc",
|
"local-oidc",
|
||||||
"mtls",
|
"mtls",
|
||||||
"tiddlywiki",
|
"tiddlywiki",
|
||||||
|
|
|
@ -14,8 +14,6 @@
|
||||||
/community/security /docs/community/security.html
|
/community/security /docs/community/security.html
|
||||||
/community/security.html /docs/community/security.html
|
/community/security.html /docs/community/security.html
|
||||||
|
|
||||||
/docs/reference/examples.html /configuration/examples.html
|
|
||||||
|
|
||||||
/guide/ /docs/quick-start/
|
/guide/ /docs/quick-start/
|
||||||
/guide/kubernetes.html /docs/quick-start/kubernetes.html
|
/guide/kubernetes.html /docs/quick-start/kubernetes.html
|
||||||
/guide/kubernetes /docs/quick-start/kubernetes.html
|
/guide/kubernetes /docs/quick-start/kubernetes.html
|
||||||
|
@ -32,4 +30,16 @@
|
||||||
/recipes/kubernetes.html /guides/kubernetes.html
|
/recipes/kubernetes.html /guides/kubernetes.html
|
||||||
/recipes/local-oidc.html /guides/local-oidc.html
|
/recipes/local-oidc.html /guides/local-oidc.html
|
||||||
/recipes/mtls.html /guides/mtls.html
|
/recipes/mtls.html /guides/mtls.html
|
||||||
/recipes/vs-code-server.html /guides/vs-code-server.html
|
/recipes/vs-code-server.html /guides/vs-code-server.html
|
||||||
|
|
||||||
|
|
||||||
|
/docs/reference/ /docs/topics/
|
||||||
|
/docs/reference/readme.html /docs/topics/readme.html
|
||||||
|
/docs/reference/certificates.html /docs/topics/certificates.html
|
||||||
|
/docs/reference/data-storage.html /docs/topics/data-storage.html
|
||||||
|
/docs/reference/getting-users-identity.html /docs/topics/getting-users-identity.html
|
||||||
|
/docs/reference/impersonation.html /docs/topics/impersonation.html
|
||||||
|
/docs/reference/production-deployment.html /docs/topics/production-deployment.html
|
||||||
|
/docs/reference/programmatic-access.html /docs/topics/programmatic-access.html
|
||||||
|
|
||||||
|
/docs/reference/examples.html /configuration/examples.html
|
||||||
|
|
|
@ -64,7 +64,7 @@ mkcert "*.localhost.pomerium.io"
|
||||||
|
|
||||||
Once you've setup your wildcard domain, we can use acme.sh to create a certificate-signing request with LetsEncrypt.
|
Once you've setup your wildcard domain, we can use acme.sh to create a certificate-signing request with LetsEncrypt.
|
||||||
|
|
||||||
<<< @/docs/docs/reference/sh/generate_wildcard_cert.sh
|
<<< @/examples/sh/generate_wildcard_cert.sh
|
||||||
|
|
||||||
LetsEncrypt will respond with the corresponding `TXT` record needed to verify our domain.
|
LetsEncrypt will respond with the corresponding `TXT` record needed to verify our domain.
|
||||||
|
|
Before Width: | Height: | Size: 19 KiB After Width: | Height: | Size: 19 KiB |
Before Width: | Height: | Size: 155 KiB After Width: | Height: | Size: 155 KiB |
Before Width: | Height: | Size: 153 KiB After Width: | Height: | Size: 153 KiB |
Before Width: | Height: | Size: 26 KiB After Width: | Height: | Size: 26 KiB |
Before Width: | Height: | Size: 210 KiB After Width: | Height: | Size: 210 KiB |
Before Width: | Height: | Size: 420 KiB After Width: | Height: | Size: 420 KiB |
Before Width: | Height: | Size: 223 KiB After Width: | Height: | Size: 223 KiB |
Before Width: | Height: | Size: 27 KiB After Width: | Height: | Size: 27 KiB |
Before Width: | Height: | Size: 152 KiB After Width: | Height: | Size: 152 KiB |
Before Width: | Height: | Size: 358 KiB After Width: | Height: | Size: 358 KiB |
|
@ -350,7 +350,7 @@ Whichever option you choose to go with, 🎉🍾🎊 **congratulations** 🎉
|
||||||
[creating sample users]: https://github.com/kubernetes/dashboard/blob/master/docs/user/access-control/creating-sample-user.md
|
[creating sample users]: https://github.com/kubernetes/dashboard/blob/master/docs/user/access-control/creating-sample-user.md
|
||||||
[dashboard ui]: https://kubernetes.io/docs/tasks/access-application-cluster/web-ui-dashboard/#deploying-the-dashboard-ui
|
[dashboard ui]: https://kubernetes.io/docs/tasks/access-application-cluster/web-ui-dashboard/#deploying-the-dashboard-ui
|
||||||
[dns01 challenge provider]: https://docs.cert-manager.io/en/latest/tasks/issuers/setup-acme/dns01/index.html
|
[dns01 challenge provider]: https://docs.cert-manager.io/en/latest/tasks/issuers/setup-acme/dns01/index.html
|
||||||
[forward-auth]: ../docs/reference/reference.html#forward-auth
|
[forward-auth]: ../docs/topics/reference.html#forward-auth
|
||||||
[helm install]: https://helm.sh/docs/using_helm/#installing-the-helm-client
|
[helm install]: https://helm.sh/docs/using_helm/#installing-the-helm-client
|
||||||
[helm]: https://helm.sh
|
[helm]: https://helm.sh
|
||||||
[homebrew]: https://brew.sh
|
[homebrew]: https://brew.sh
|
||||||
|
@ -362,5 +362,5 @@ Whichever option you choose to go with, 🎉🍾🎊 **congratulations** 🎉
|
||||||
[nginx]: https://docs.nginx.com/nginx/admin-guide/security-controls/configuring-subrequest-authentication/
|
[nginx]: https://docs.nginx.com/nginx/admin-guide/security-controls/configuring-subrequest-authentication/
|
||||||
[securing your helm installation]: https://helm.sh/docs/using_helm/#securing-your-helm-installation
|
[securing your helm installation]: https://helm.sh/docs/using_helm/#securing-your-helm-installation
|
||||||
[snap]: https://github.com/snapcrafters/helm
|
[snap]: https://github.com/snapcrafters/helm
|
||||||
[with pomerium]: ../docs/reference/reference.html#forward-auth
|
[with pomerium]: ../docs/topics/reference.html#forward-auth
|
||||||
[your dashboard]: http://localhost:8001/api/v1/namespaces/kubernetes-dashboard/services/https:kubernetes-dashboard:/proxy/#/login
|
[your dashboard]: http://localhost:8001/api/v1/namespaces/kubernetes-dashboard/services/https:kubernetes-dashboard:/proxy/#/login
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
---
|
---
|
||||||
title: Kubernetes
|
title: Kubernetes API / Kubectl
|
||||||
lang: en-US
|
lang: en-US
|
||||||
meta:
|
meta:
|
||||||
- name: keywords
|
- name: keywords
|
||||||
|
@ -35,7 +35,7 @@ kind create cluster --config=./kind-config.yaml
|
||||||
|
|
||||||
### Pomerium Service Account
|
### Pomerium Service Account
|
||||||
|
|
||||||
Pomerium uses a single service account and user impersonatation headers to authenticate and authorize users in Kubernetes. To create the Pomerium service account use the following config: (`pomerium-k8s.yaml`)
|
Pomerium uses a single service account and user impersonation headers to authenticate and authorize users in Kubernetes. To create the Pomerium service account use the following config: (`pomerium-k8s.yaml`)
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
# pomerium-k8s.yaml
|
# pomerium-k8s.yaml
|
||||||
|
@ -265,3 +265,6 @@ kubectl --context=via-pomerium cluster-info
|
||||||
```
|
```
|
||||||
|
|
||||||
You should be prompted to login and see the resulting cluster info.
|
You should be prompted to login and see the resulting cluster info.
|
||||||
|
|
||||||
|
|
||||||
|
[kubernetes]: https://kubernetes.io
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
---
|
---
|
||||||
title: local oidc
|
title: Local OIDC Provider
|
||||||
lang: en-US
|
lang: en-US
|
||||||
meta:
|
meta:
|
||||||
- name: keywords
|
- name: keywords
|
||||||
|
|
|
@ -3,10 +3,11 @@
|
||||||
This section contains applications, and scenario specific guides for Pomerium.
|
This section contains applications, and scenario specific guides for Pomerium.
|
||||||
|
|
||||||
- The [ad-guard](./ad-guard.md) recipe demonstrates how pomerium can be used to augment web applications that only support simplistic authorization mechanisms like basic-auth with single-sign-on driven access policy.
|
- The [ad-guard](./ad-guard.md) recipe demonstrates how pomerium can be used to augment web applications that only support simplistic authorization mechanisms like basic-auth with single-sign-on driven access policy.
|
||||||
- The [Cloud Run](./cloud-run.md) recipe demonstrates deploying pomerium to Google Cloud Run as well as using it to Authorize users to protected Cloud Run endpoints.
|
|
||||||
- The [kubernetes](./kubernetes.md) guide covers how to add authentication and authorization to kubernetes dashboard using helm, and letsencrypt certificates. This guide also shows how third party reverse-proxies like nginx/traefik can be used in conjunction with pomerium using forward-auth.
|
|
||||||
- The [visual studio code](./vs-code-server.md) guide demonstrates how pomerium can be used to add access control to third-party applications that don't ship with [fine-grained access control](https://github.com/cdr/code-server/issues/905).
|
|
||||||
- The [argo](./argo.md) guide demonstrates how pomerium can be used to add access control to [Argo](https://argoproj.github.io/projects/argo).
|
- The [argo](./argo.md) guide demonstrates how pomerium can be used to add access control to [Argo](https://argoproj.github.io/projects/argo).
|
||||||
- The [mTLS](./mtls.md) guide demonstrates how pomerium can be used to add mutual authentication using client certificates and a custom certificate authority.
|
- The [Cloud Run](./cloud-run.md) recipe demonstrates deploying pomerium to Google Cloud Run as well as using it to Authorize users to protected Cloud Run endpoints.
|
||||||
|
- The [Kubernetes Dashboard](./kubernetes-dashboard.md) guide covers how to secure Kubernetes dashboard using Pomerium.
|
||||||
|
- The [kubernetes](./kubernetes.md) guide covers how to add authentication and authorization to kubernetes dashboard using helm, and letsencrypt certificates. This guide also shows how third party reverse-proxies like nginx/traefik can be used in conjunction with pomerium using forward-auth.
|
||||||
- The [local OIDC](./local-oidc.md) guide demonstrates how pomerium can be used with local OIDC server for dev/testing.
|
- The [local OIDC](./local-oidc.md) guide demonstrates how pomerium can be used with local OIDC server for dev/testing.
|
||||||
|
- The [mTLS](./mtls.md) guide demonstrates how pomerium can be used to add mutual authentication using client certificates and a custom certificate authority.
|
||||||
- The [TiddlyWiki](./tiddlywiki.md) guide demonstrates how pomerium can be used to add authentication and authorization to web application using authenticated header.
|
- The [TiddlyWiki](./tiddlywiki.md) guide demonstrates how pomerium can be used to add authentication and authorization to web application using authenticated header.
|
||||||
|
- The [visual studio code](./vs-code-server.md) guide demonstrates how pomerium can be used to add access control to third-party applications that don't ship with [fine-grained access control](https://github.com/cdr/code-server/issues/905).
|
|
@ -1122,7 +1122,7 @@ Note: This setting will replace (not append) the system's trust store for a give
|
||||||
- Type: [base64 encoded] `string` or relative file location
|
- Type: [base64 encoded] `string` or relative file location
|
||||||
- Optional
|
- Optional
|
||||||
|
|
||||||
Pomerium supports client certificates which can be used to enforce [mutually authenticated and encrypted TLS connections](https://en.wikipedia.org/wiki/Mutual_authentication) (mTLS). For more details, see our [mTLS example repository](https://github.com/pomerium/examples/tree/master/mutual-tls) and the [certificate docs](../docs/reference/certificates.md).
|
Pomerium supports client certificates which can be used to enforce [mutually authenticated and encrypted TLS connections](https://en.wikipedia.org/wiki/Mutual_authentication) (mTLS). For more details, see our [mTLS example repository](https://github.com/pomerium/examples/tree/master/mutual-tls) and the [certificate docs](../docs/topics/certificates.md).
|
||||||
|
|
||||||
### Websocket Connections
|
### Websocket Connections
|
||||||
|
|
||||||
|
|