Template YAML of elm-auth-secret
apiVersion: v1
kind: Secret
metadata:
name: elm-auth-secret
namespace: <namespace> # Kubernetes Cluster Namespace
stringData:
CCM_DB_JDBC_PASSWORD: <password> # CCM DataBase JDBC Password
DB_USER_PASSWORD: <password> # DataBase Password
DCC_DB_JDBC_PASSWORD: <password> # DCC DataBase JDBC Password
DW_JDBC_PASSWORD: <password> # DW DataBase JDBC Password
GC_DB_JDBC_PASSWORD: <password> # GC DataBase JDBC Password
JTS_DB_JDBC_PASSWORD: <password> # JTS DataBase JDBC Password
LDX_DB_JDBC_PASSWORD: <password> # LDX DataBase JDBC Password
LQE_DB_JDBC_PASSWORD: <password> # LQE DataBase JDBC Password
ENI_DB_JDBC_PASSWORD: <password> # ENI DataBase JDBC Password
QM_DB_JDBC_PASSWORD: <password> # QM DataBase JDBC Password
RM_DB_JDBC_PASSWORD: <password> # RM DataBase JDBC Password
OIDC_PROVIDER_USERID: <auth-provider-user> # OIDC/LDAP Provider User ID
OIDC_PROVIDER_PASSWORD: <auth-password> # OIDC/LDAP Provider User ID's Password
SCIM_PROVIDER_USERID: <scim-provider-user> # SCIM User ID
SCIM_PROVIDER_PASSWORD: <password> # SCIM User ID's Password
SCIM_USERID_MAPPING: <scim-userid-mapping> # SCIM User ID Mapping
SSL_KEYSTORE_PW: <password> # SSL Certificate Keystore (JKS) Password
GC_ACTIVATION_KEY: <gc-activation-key> # GC Activation Key
LDAP_PASSWORD: <password> # LDAP Registry Password
OIDC_CLIENT_ID: <oidc-client-id> # OIDC Client User ID
OIDC_CLIENT_SECRET: <oidc-client-secret> # OIDC Client User ID's Password
type: Opaque
Fully populated sample YAML of elm-auth-secret
kind: Secret
apiVersion: v1
metadata:
name: elm-auth-secret
namespace: example
stringData:
CCM_DB_JDBC_PASSWORD: example
DB_USER_PASSWORD: example
DCC_DB_JDBC_PASSWORD: example
DW_JDBC_PASSWORD: example
GC_DB_JDBC_PASSWORD: example
JTS_DB_JDBC_PASSWORD: example
LDAP_PASSWORD: example
LDX_DB_JDBC_PASSWORD: example
LQE_DB_JDBC_PASSWORD: example
OIDC_PROVIDER_PASSWORD: example
OIDC_PROVIDER_USERID: example@user.com
QM_DB_JDBC_PASSWORD: example
ENI_DB_JDBC_PASSWORD: example
RM_DB_JDBC_PASSWORD: example
SCIM_PROVIDER_PASSWORD: example
SCIM_PROVIDER_USERID: example@user.com
SCIM_USERID_MAPPING: example@user.com
GC_ACTIVATION_KEY: example
LDAP_PASSWORD: example
SSL_KEYSTORE_PW: secret
OIDC_CLIENT_ID: example@user.com
OIDC_CLIENT_SECRET: secret
type: Opaque
Template YAML of elm-tls-certs-secret LDAP
kind: Secret
apiVersion: v1
metadata:
name: elm-tls-certs-secret
namespace: <namespace> # Kubernetes Cluster Namespace
stringData:
LDAP_SSL_CERTIFICATE: |
# ldap server base-64 X.509 ( tls , intermediate, root ) SSL certificate data
type: Opaque
Fully populated sample YAML of elm-tls-certs-secret LDAP
kind: Secret
apiVersion: v1
metadata:
name: elm-tls-certs-secret
namespace: example
stringData:
LDAP_SSL_CERTIFICATE: |
#base-64 X.509 ( tls , intermediate, root ) SSL certificate data
-----BEGIN CERTIFICATE-----
MIIDeTCCAmGgAwIBAgIESG5/rjANBgkqhkiG9w0BAQsFADBtMQswCQYDVQQGEwJJ
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIDeTCCAmGgAwIBAgIESG5/rjANBgkqhkiG9w0BAQsFADBtMQswCQYDVQQGEwJJ
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIDeTCCAmGgAwIBAgIESG5/rjANBgkqhkiG9w0BAQsFADBtMQswCQYDVQQGEwJJ
-----END CERTIFICATE-----
type: Opaque
Template YAML of elm-tls-certs-secret OIDC
kind: Secret
apiVersion: v1
metadata:
name: elm-tls-certs-secret
namespace: <namespace> # Kubernetes Cluster Namespace
type: Opaque
stringData:
oidc-ssl-certificate: |
# SSL certificate data of your OIDC server in Base-64 X.509 format.
Fully populated sample YAML of elm-tls-certs-secret OIDC
kind: Secret
apiVersion: v1
metadata:
name: elm-tls-certs-secret
namespace: example
type: Opaque
stringData:
oidc-ssl-certificate: |
-----BEGIN CERTIFICATE-----
MIIDeTCCAmGgAwIBAgIESG5/rjANBgkqhkiG9w0BAQsFADBtMQswCQYDVQQGEwJJ
-----END CERTIFICATE-----
Template YAML of elm-saml-idp-metadata SAML
kind: Secret
apiVersion: v1
metadata:
name: elm-saml-idp-metadata
namespace: <namespace> # Kubernetes Cluster Namespace
type: Opaque
stringData:
idpMetadata.xml: |
# IDP Provider xml data.
Fully populated sample YAML of elm-saml-idp-metadata SAML
kind: Secret
apiVersion: v1
metadata:
name: elm-saml-idp-metadata
namespace: example
type: Opaque
stringData:
idpMetadata.xml: |
<EntityDescriptor
ID="_example123"
entityID="https://example.idp.server"
validUntil="2025-04-25T09:48:54Z"
cacheDuration="PT15M"
xmlns="urn:oasis:names:tc:SAML:2.0:metadata"
xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">
<IDPSSODescriptor WantAuthnRequestsSigned="true" protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
<SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://example.idp.server/saml/sso" />
<SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://example.idp.server/saml/sso" />
<SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact" Location="https://example.idp.server/saml/sso" />
<SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://example.idp.server/saml/slo" />
<SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://example.idp.server/saml/slo" />
<SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact" Location="https://example.idp.server/saml/slo" />
<ArtifactResolutionService Binding="urn:oasis:names:tc:SAML:2.0:bindings:SOAP" Location="https://example.idp.server/saml/ars" index="0" />
<NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</NameIDFormat>
<NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>
<NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:persistent</NameIDFormat>
<NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</NameIDFormat>
<KeyDescriptor use="signing">
<KeyInfo
xmlns="https://ibm.com/#">
<X509Data>
<X509Certificate>IDP_PUBLIC_SIGNING_CERTIFICATE_USED_FOR_SIGNING_RESPONSES</X509Certificate>
</X509Data>
</KeyInfo>
</KeyDescriptor>
</IDPSSODescriptor>
<Organization>
<OrganizationName xml:lang="en-GB">IBM</OrganizationName>
<OrganizationDisplayName xml:lang="en-GB">IBM Org</OrganizationDisplayName>
<OrganizationURL xml:lang="en-GB">https://ibm.com/</OrganizationURL>
</Organization>
<ContactPerson contactType="technical">
<Company>IBM</Company>
<GivenName>example</GivenName>
<SurName>example</SurName>
<EmailAddress>example@ibm.com</EmailAddress>
</ContactPerson>
</EntityDescriptor>