In this blog post, we will walk through the configuration of an Identity Provider (IdP) and create an OIDC Public Application Client, which will be used to grant access to a PAIS deployment. As of this blog post, the instructions for setting up the required IdP will be based on Authentik (which I have blogged about before), which is a free and self-hosted IdP solution.
Note: I am also looking to get this working using Keycloak, but currently I am still debugging some issues, so will provide an updated blog post once I can also use Keycloak as an IdP for PAIS.
Requirements:
- DNS entry for IdP (e.g. auth2.vcf.lab)
- DNS placeholder entry for the PAIS deployment instance (e.g. pais.vcf.lab)
- vSphere environment to deploy the IdP
