This repository demonstrates securing a pod with a sidecar that can perform challenge authentication with kerberos
- Computer bound to an Active Directory
- Keytab as an HTTP service principal
- Service account created to bind to the HTTP Kerberos Principal
- on a windows machine generate the keytab with
- Save the keytab file to helm/files/krb5.keytab
- From the root directory execute, replacing with your host you defined in your keytab creation
helm install sso-proxy helm --set route.host=(host used from keytab above)
- Go to the address http://(host used from keytab above)/hi
- You should see the currently logged in user's principal (ex. user@MY.DOMAIN.EXAMPLE.COM)