The default deployment approach is to leverage IP addresses and self signed certificates for the Pinniped supervisor endpoint. However, in our lab we will leverage FQDN's managed by your DNS provider and Let's Encrypt to generate valid SSL certificates. The pinniped-addon
secret within the management cluster contains configuration information that drives this behavior. In addition, there is some patching that is required of key Pinniped resources.
./scripts/update-pinniped-configuration.sh
There are several key resources that contain the pinniped configuration state. Let's get these resources to verify the specifications are as we expect.
kubectl get cm pinniped-info -n kube-public -oyaml
kubectl get federationdomain -n pinniped-supervisor -oyaml
kubectl get jwtauthenticator -n pinniped-concierge -oyaml
kubectl get oidcidentityprovider -n pinniped-supervisor -oyaml