Last updated
Was this helpful?
Last updated
Was this helpful?
Helm version 3 is installed on your system.
The Kubernetes command line tool kubectl is configured and has access to the target installation.
You know the name and namespace of your Connectware installation. See .
The values.yaml file is available.
.
If you don’t want to provide the bind user for LDAP authentication through the Helm values bindDn
and bindPassword
within the global.authentication.ldap
context, you can also manually create a Kubernetes secret in Connectware’s namespace through your preferred method of managing secrets in Kubernetes. You will then need to provide the name of this secret in the Helm value existingBindSecret
.
This secret needs to contain two keys, bindDn
and bindPassword
, containing the parameters you did not specify directly as Helm values. If you want to use different keys, you can customize these as shown below.
Example
Create your Kubernetes secret:
Specify the name of the Secret:
If you want to customize the keys used in the Kubernetes secret, you can do so and specify the keys you want to use instead in the Helm value existingBindSecretDnKey
and existingBindSecretPasswordKey
within the global.authentication.ldap
context.
Example
Create your Kubernetes secret:
Specify the name of the Secret in your values.yaml file:
Related Links
.