You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Updates service accounts page with JWT example (#1296)
Updates service accounts page with JWT example (#1289)
* adds minor updates to doc
* updates service accounts page
* fixes precommits
* Update content/docs/capabilities/service-accounts.md
Co-authored-by: zachary painter <[email protected]>
Service accounts offer a protected and standardized method of authenticating machine-to-machine communication between services protected by Pomerium.
18
19
19
-
:::tip
20
+
:::enterprise
20
21
21
-
Before you begin, confirm you are in the correct Namespace. A service account can only be used in the Namespace it was created in, including its children Namespaces.
22
+
Service Accounts are a Pomerium Enterprise feature. The steps below show you how to create and use a Service Account in the Enterprise Console. See our [Pomerium Enterprise](/docs/deploy/enterprise) page for more information.
22
23
23
24
:::
24
25
25
-
1. From the main menu, select **Service Accounts** under **CONFIGURE**. Click the **+ ADD SERVICE ACCOUNT** button:
26
+
## Add a Service Account in the Enterprise Console
26
27
27
-

28
+
Before you begin, confirm you are in the correct Namespace. You can only use a serviceaccount in the Namespace it was created in, including its children Namespaces.
28
29
29
-
1. Service accounts can be unique and exist only for Pomerium, or impersonate directory users from your IdP.
30
+
### Add a service account
30
31
31
-
Give the user a unique ID, or select an existing user to impersonate. Consider referencing the Namespace you're creating it under, for easier reference later. Optionally set an expiration date:
32
+
1. In the **Service Accounts** dashboard, select **+ ADD SERVICE ACCOUNT**:
33
+
34
+

35
+
36
+
1. Give the service account a unique **User ID**, or select an existing user to impersonate. Consider referencing the Namespace you're creating it under, for easier reference later. Optionally, set an expiration date.
32
37
33
38

34
39
35
40
The user ID set here corresponds to the `User` criteria when editing a policy.
36
41
37
-
1. After you click **Submit**, the modal presents the JSON web token (**JWT**) for the service account. Temporarily save it somewhere secure, as you will not be able to view it again:
This JWT must be added to your application configuration to enable direct communication.
51
+
:::
52
+
53
+
### Save the service account JWT
54
+
55
+
1. After you select **Submit**, the modal presents the JSON web token (**JWT**) to authenticate the service account. Save it somewhere secure, as you won't be able to view it again:
0 commit comments