Attach Kubernetes Auth configuration onto machine identity
Documentation Index
Fetch the complete documentation index at: https://infisical-saif-eng-4890-add-support-for-oracle-db-access-in.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
An access token in Infisical
The ID of the machine identity to attach the configuration onto.
The host string, host:port pair, or URL to the base of the Kubernetes API server.
1The comma-separated list of trusted namespaces that service accounts must belong to authenticate with Infisical.
The comma-separated list of trusted service account names that can authenticate with Infisical.
The optional audience claim that the service account JWT token must have to authenticate with Infisical.
The PEM-encoded CA certificate used to validate the Kubernetes API server's TLS certificate. Required when verifyTlsCertificate is true. Supplying a non-empty caCert always implies verifyTlsCertificate=true; explicitly setting the toggle to false in the same request is rejected.
Whether to verify the Kubernetes API server's TLS certificate against the configured CA certificate. When true, caCert is required. When false, the connection is still over HTTPS but the API server's certificate is not verified, and caCert must be empty. If omitted, defaults to true when caCert is provided and false otherwise.
Optional JWT token for accessing Kubernetes TokenReview API. If provided, this long-lived token will be used to validate service account tokens during authentication. If omitted, the client's own JWT will be used instead, which requires the client to have the system:auth-delegator ClusterRole binding.
The mode to use for token review. Must be one of: 'api', 'gateway'. If gateway is selected, the gateway must be deployed in Kubernetes, and the gateway must have the system:auth-delegator ClusterRole binding.
api, gateway The ID of the gateway to use when performing kubernetes API requests.
The IPs or CIDR ranges that access tokens can be used from.
1The lifetime for an access token in seconds.
0 <= x <= 315360000The maximum lifetime for an access token in seconds.
0 <= x <= 315360000The maximum number of times that an access token can be used.
x >= 0Default Response