Build

Enterprise Auth

Integrate enterprise-grade user authentication into your Kubernetes clusters and microservices

Enquire now

Secure Software Supply Chain

Security Hardening

Production Observability

Introduction

When migrating to a Kubernetes environment, it's important to ensure authorisation is set up appropriately across the Kubernetes environment itself as well as across any linked services. It would be unwise to give the key to your house to just anyone, and it's important to make sure anyone entering through any entrance of your house (Kubernetes cluster) is authenticated.

Who is this product offering suitable for?

This is intended for your Developers, Operations or DevOps teams.

What does this product offering include?

Technical Specification

  • Setting up an identity broker system (such as Keycloak or Okta) across your Kubernetes environments
  • Support with linking the chosen identity broker with external OpenID Connect or SAML identity providers (such as Active Directory)
  • Support with importing and mapping external identity provider groups and roles to chosen identity broker
  • Extending existing enterprise authentication identities over to the Kubernetes environment (for example Two Factor Authentication)
  • Expert consultancy provided for setting up Access Control Lists (ACLs) to align with Kubernetes best practices
  • Advice in setting up self service ways of accessing clusters such as Gangway
  • We help implement OIDC across applications which don't currently support this, avoiding the issue where x509 certificates continue to work until their TTL has expired

People-focused Specification

  • Expose your team to authentication best practices across a Kubernetes environment
  • Ease of access whilst developing various components of the Kubernetes cluster via SSO

What benefits does this product offering have for your Kubernetes environment?

Be assured that you have full authentication coverage across all necessary components in your Kubernetes environment

Tailored consultation for SSO implementation across all applications including those with or without OIDC support or SAML

Kubernetes specific best practices applied to your ACLs

Get in touch

And find out more about how we can help you.

Enquire now