With a connector installed on your Kubernetes platform, the next step is setting permissions for Apono to manage access control.
- Cluster admin access to the cluster you'd like to integrate
- An Apono Kubernetes connector
Please note! If you installed the Apono connector on the cluster, there is no need to provide the secret in the Add Integration form in the UI.
The connector already handles the secret ;)
- Select Kubernetes from the Catalog.
- On the next page, select an existing connector from the drop-down list.
- Click Next to view the Kubernetes integration form.
- Name the integration.
- Enter the following Kubernetes parameters, which can be found with kubectl:
- Cluster Name
- If you installed the Apono connector on the cluster, leave this empty. Otherwise:
- With a GCP secret manager:
- Secret ID
- With Kubernetes secret manager:
- Secret Name
- With an Azure secret manager:
- Vault URL
- Secret Name
Integration of Apono with self-managed Kubernetes is now complete.
- Manage users and groups. If you have and IdP set up, for example Okta or Azure AD, you may want to integrate Apono in order to sync users and groups.
- You can now control access to this resource by defining Access Flows.
- Make it easy for your users to request access by integrating your Slack or Teams organization with Apono.
Updated about 1 month ago