Skip to content

Commit

Permalink
clarify the procedure
Browse files Browse the repository at this point in the history
Signed-off-by: ilyes Ajroud <[email protected]>
  • Loading branch information
ilyesAj authored Jan 3, 2025
1 parent dcc7677 commit 01cc876
Showing 1 changed file with 14 additions and 1 deletion.
15 changes: 14 additions & 1 deletion content/docs/configuration/venafi.md
Original file line number Diff line number Diff line change
Expand Up @@ -186,7 +186,20 @@ $ kubectl create secret generic \

### Username / Password Authentication

> **Note**: when using username/password authentification, cert-manager will manage the generation of access token for you . It will also get a refresh token to be used to query a new access token once expired. Follow the procedure on the section below to create an application with the appropriate scope and ID.
> **Note**: when using username/password authentification, cert-manager will manage the generation of access token for you . It will also get a refresh token to be used to query a new access token once expired.
1. Create a new user with sufficient privileges to manage and revoke certificates in a particular policy folder (zone).

E.g. `k8s-xyz-automation`

2. [Create a new application integration](https://docs.venafi.com/Docs/24.3/TopNav/Content/API-ApplicationIntegration/t-APIAppIntegrations-creating.php)

Create an application integration with name and ID `cert-manager.io`.
Set the "Base Access Settings" to `certificate: manage,revoke`.

"Edit Access" to the new application integration, and allow it to be used by the user you created earlier.

4. Save the credentials to a Secret in the Kubernetes cluster

```bash
$ kubectl create secret generic \
Expand Down

0 comments on commit 01cc876

Please sign in to comment.