Software Alternatives & Reviews

Five Dex Alternatives for Kubernetes Authentication

Zapier Rancher OpenID Connect LDAP Kubernetes Google Kubernetes Engine Google Cloud IAM Google Cloud Platform Visual Studio Team Services Amazon EKS
  1. 1
    Connect the apps you use everyday to automate your work and be more productive. 1000+ apps and easy integrations - get started in minutes.
    Azure AD integrates with existing infrastructure, including software-as-a-service (SaaS) applications such as Azure DevOps, Exchange Online, Zapier, and Microsoft Developer Network (MSDN). With this integration, you can choose to either use single sign-on (SSO) to applications directly or launch applications from a portal, such as the Azure AD access panel.

    #Web Service Automation #Automation #API Tools 12 social mentions

  2. Open Source Platform for Running a Private Container Service
    Pricing:
    • Open Source
    Rancher provides a Rancher authentication proxy that allows user authentication from a central location. With this proxy, you can set the credential for authenticating users that want to access your Kubernetes clusters. You can create, view, update, or delete users through Rancher’s UI and API.

    #DevOps Tools #Developer Tools #Continuous Integration And Delivery 24 social mentions

  3. OpenID Connect page
    Among the options for auth providers is Dex, which relies on OpenID Connect to enable authentication for other applications. It’s a popular choice because it comes with connectors to allow user authentication against other third-party identity providers. Dex supports protocols such as Lightweight Directory Access Protocol (LDAP) and Security Assertion Markup Language (SAML) as well as platforms such as GitLab, Active Directory, and GitHub.

    #Identity And Access Management #Web Security #Cyber Security 46 social mentions

  4. 4
    LDAP is a very flexible standards-based method that can be used to store and query information about users, groups, devices and provide authentication and authorization services in a networked environment.
    Among the options for auth providers is Dex, which relies on OpenID Connect to enable authentication for other applications. It’s a popular choice because it comes with connectors to allow user authentication against other third-party identity providers. Dex supports protocols such as Lightweight Directory Access Protocol (LDAP) and Security Assertion Markup Language (SAML) as well as platforms such as GitLab, Active Directory, and GitHub.

    #Development #Identity And Access Management #Identity Provider 1 social mentions

  5. Kubernetes is an open source orchestration system for Docker containers
    Pricing:
    • Open Source
    Authentication helps control access to cluster resources by first verifying a user’s identity. In Kubernetes, the API server needs to verify the identity of every request it receives. Such requests may come from a program like a pod or from a human user. Since Kubernetes lacks a built-in feature for authenticating users, you’ll need to rely on auth providers for this service. Fortunately, the container orchestration platform accommodates a variety of authentication providers.

    #Developer Tools #DevOps Tools #Containers As A Service 280 social mentions

  6. Google Kubernetes Engine is a powerful cluster manager and orchestration system for running your Docker containers. Set up a cluster in minutes.
    Google Cloud Platform (GCP) provides OAuth to authenticate with the Kubernetes API server. As the preferred authentication strategy for Kubernetes clusters, OAuth is configured automatically in Google Kubernetes Engine (GKE). Using this method, you can authenticate your clusters by signing in to the gcloud command line tool to open a web browser that completes the authentication process to Google Cloud.

    #Developer Tools #Containers As A Service #Cloud Computing 41 social mentions

  7. Google Cloud Identity & Access Management (IAM) lets administrators authorize who can take action on specific resources, giving you full control and visibility to manage cloud resources centrally.
    OAuth 2.0 authenticates both service accounts and user accounts in GKE. This authentication protocol uses the OpenID Connect method to verify the identity of Kubernetes clusters. GKE is integrated with Google Cloud IAM, so you can also use IAM to control access to your clusters or to configure a user to control the GKE cluster and Google Cloud resources.

    #Identity And Access Management #Identity Provider #SSO 6 social mentions

  8. Google Cloud provides flexible infrastructure, end-to-security, modern productivity, and intelligent insights engineered to help your business thrive.
    Google Cloud Platform (GCP) provides OAuth to authenticate with the Kubernetes API server. As the preferred authentication strategy for Kubernetes clusters, OAuth is configured automatically in Google Kubernetes Engine (GKE). Using this method, you can authenticate your clusters by signing in to the gcloud command line tool to open a web browser that completes the authentication process to Google Cloud.

    #Cloud Computing #Backend As A Service #Cloud Infrastructure 167 social mentions

  9. Visual Studio Team Services (VSTS) provides unlimited Git hosting, cloud build for CI, agile planning and continuous delivery.
    Azure AD integrates with existing infrastructure, including software-as-a-service (SaaS) applications such as Azure DevOps, Exchange Online, Zapier, and Microsoft Developer Network (MSDN). With this integration, you can choose to either use single sign-on (SSO) to applications directly or launch applications from a portal, such as the Azure AD access panel.

    #A/B Testing #Website Testing #Project Management 29 social mentions

  10. Amazon EKS makes it easy for you to run Kubernetes on AWS without needing to install and operate your own Kubernetes clusters.
    Access to Kubernetes clusters in Amazon EKS is controlled by the AWS IAM Authenticator for Kubernetes. The authenticator runs on the EKS control plane and depends on the aws-auth ConfigMap for configuration settings. Every time you use kubectl to perform actions on the EKS cluster, the AWS IAM Authenticator generates an STS token (AWS Security Token Service). Kubernetes uses the IAM authenticator service to verify the identity of users specified in this security token.

    #Cloud Computing #Developer Tools #Cloud Infrastructure 54 social mentions

Discuss: Five Dex Alternatives for Kubernetes Authentication

Log in or Post with