...
Setup a new JumpCloud SSO OIDC application as per https://jumpcloud.com/support/sso-with-oidc
Fill the redirect URL as
https://<REPLACE_DNS_HOST>/oauth2/callback
Fill the login URL as
https://<REPLACE_DNS_HOST>/oauth2/sign_in
Remember to copy the client-id & client-secret for further instructions.
Please make sure appropriate user-groups have access to then new SSO application.
Create a config map specification as follows in kfuse namespace replacing the DNS host and account (note the configmap name):
Code Block apiVersion: v1 data: oauth2_proxy.cfg: | display_htpasswd_form = "true" email_domains = [ "*" ] cookie_secure = "true" provider = "oidc" redirect_url = "https://<REPLACE_DNS_HOST>/oauth2/callback" oidc_issuer_url = "https://oauth.id.jumpcloud.com/" kind: ConfigMap metadata: annotations: labels: app.kubernetes.io/managed-by: Helm name: kfuse-auth-jumpcloud-config
...