Creating an OIDC secret
We need the credentials form your SSO provider stored in a Kubernetes Secret i.e.
apiVersion: v1
kind: Secret
metadata:
name: oidc-credentials
type: Opaque
data:
client_id: <base64_encoded_client_id>
client_secret: <base64_encoded_client_secret>
issuer_url: <base64_encoded_issuer_url>
Integrating Single Sign On
apiVersion: bionic-gpt.com/v1
kind: Bionic
metadata:
name: bionic-gpt
namespace: bionic-gpt
spec:
...
# Single Sign ON
sso-secret: oidc-credentials
...