Skip to content

Commit fed6fc8

Browse files
committed
updates service accounts page
1 parent 98d1748 commit fed6fc8

File tree

2 files changed

+33
-8
lines changed

2 files changed

+33
-8
lines changed
Loading

content/docs/capabilities/service-accounts.md

+33-8
Original file line numberDiff line numberDiff line change
@@ -22,23 +22,23 @@ Service Accounts are a Pomerium Enterprise feature. The steps below show you how
2222

2323
:::
2424

25-
## Service Accounts in the Enterprise Console
25+
## Add a Service Account in the Enterprise Console
2626

2727
Before you begin, confirm you are in the correct Namespace. You can only use a service account in the Namespace it was created in, including its children Namespaces.
2828

2929
### Add a service account
3030

31-
1. Under **CONFIGURE**, select **Service Accounts**, then **+ ADD SERVICE ACCOUNT**:
31+
1. In the **Service Accounts** dashboard, select **+ ADD SERVICE ACCOUNT**:
3232

33-
![The Service Accounts page](./img/service-accounts/console-service-account.png)
33+
![Adding a Service Account in the Global namespace in the Enterprise Console](./img/service-accounts/add-service-account.png)
3434

3535
1. Give the service account a unique **User ID**, or select an existing user to impersonate. Consider referencing the Namespace you're creating it under, for easier reference later. Optionally, set an expiration date.
3636

3737
![Adding a unique service account](./img/service-accounts/create-service-account.png)
3838

3939
The user ID set here corresponds to the `User` criteria when editing a policy.
4040

41-
:::note
41+
:::info
4242

4343
Service accounts can be unique and exist only for Pomerium, or impersonate directory users from your identity provider.
4444

@@ -49,9 +49,9 @@ Before you begin, confirm you are in the correct Namespace. You can only use a s
4949

5050
:::
5151

52-
### Handle the service account JWT
52+
### Save the service account JWT
5353

54-
1. After you click **Submit**, the modal presents the JSON web token (**JWT**) for the service account. Temporarily save it somewhere secure, as you will not be able to view it again:
54+
1. After you select **Submit**, the modal presents the JSON web token (**JWT**) to authenticate the service account. Save it somewhere secure, as you won't be able to view it again:
5555

5656
![Service Account Added](./img/service-accounts/service-account-jwt.png)
5757

@@ -61,10 +61,35 @@ Before you begin, confirm you are in the correct Namespace. You can only use a s
6161

6262
![An example policy for a service account in the policy builder](./img/service-accounts/create-policy-2.png)
6363

64-
Pomerium provides three ways to authenticate with a Service Account JWT:
64+
#### Service Account JWT authentication
65+
66+
Pomerium provides three methods to authenticate with a Service Account JWT:
6567

6668
- `Authorization: Bearer Pomerium-${pomerium_jwt}`
6769
- `X-Pomerium-Authorization: ${pomerium_jwt}`
6870
- `Authorization: Pomerium ${pomerium_jwt}`
6971

70-
72+
For example, the curl command below demonstrates how to send an authenticated request using the bearer token method:
73+
74+
```bash
75+
curl -i -H "Accept: application/json" -H "Authorization: Bearer Pomerium-${pomerium_jwt}"
76+
https://verify.localhost.pomerium.io
77+
```
78+
79+
If the request is valid, the response would look similar to the example below:
80+
81+
```bash
82+
HTTP/2 200
83+
accept-ranges: bytes
84+
cache-control: no-cache
85+
content-type: text/html; charset=utf-8
86+
etag: "75df42fffe5e9fdf2c13f64963d04e8115fb06f8e9c4a97db3c9d7394ab6be38"
87+
x-cloud-trace-context: 97f79dda2b32e0618d7e53cee2c85bcb;o=1
88+
date: Mon, 04 Mar 2024 21:56:24 GMT
89+
server: envoy
90+
content-length: 1191
91+
x-envoy-upstream-service-time: 206
92+
x-frame-options: SAMEORIGIN
93+
x-xss-protection: 1; mode=block
94+
x-request-id: bcd0bb52-25fb-4858-8da0-a552fc9b2859
95+
```

0 commit comments

Comments
 (0)