Web address to search for information about domains
You can definitely several of those GCP APIs that our integration needs individually, but there is a little known webpage that allows you to enable them all at once like so. If you examine the URL, you can see how each of the APIs have the official service name added to the query parameters and the user simply selects which project they want to apply these to and it will enable them all. If the API is already enabled it will just skip it. https://console.cloud.google.com/apis/enableflow;apiid=cloudresourcemanager.googleapis.co[…]pis.com,logging.googleapis.com,cloudasset.googleapis.com
This script will use an Akeyless T-Token to authenticate to the API and download account details for reference WITHOUT accessing secret values.
The script will create a data
directory and place the JSON files into that directory.
- Install Nu Shell
- Download the script and make it executable
- Execute the script
Deploying an Akeyless Gateway into an Azure Kubernetes Service (AKS) cluster using Azure Workload Identity allows the Gateway to authenticate using its own Azure AD Identity without storing long-lived credentials. This setup ensures secure, seamless authentication through Azure AD authentication methods.
Before proceeding, ensure you have:
- An AKS Cluster (running Kubernetes 1.21+)
- Azure CLI installed and authenticated (
az login
)
GitHub Enterprise plans allow for setting an SSH Certificate Authority. We can configure the Akeyless CLI to use the company SSO to enable the user to authenticate and then use an SSH Cert Issuer to create and utilize an SSH Certificate signed by the CA of an Akeyless RSA2048 DFC Key. The SSH Certificate Issuer will use the user's local SSH key to create the SSH Certificate. We can confgure the user's local SSH client to utilize the certificate for connections to GitHub like below.
- Download the Akeyless CLI and configure the default profile to use the appropriate Single Sign On SSO (SAML/OIDC) for the user
- Create a DFC RSA2048 Key (Signer Key)
- Create a SSH Cert Issuer that uses the Signer Key
The Access ID should look something like p-8au8y41c5us0wm
kubectl config view --flatten --minify --output=go-template='====================
Cluster Endpoint URL:
====================