The Elastisys Tech Blog


Connect your IDP to your Compliant Kubernetes cluster


This post is only written for Google and Azure, although for our managed service customers we can add any identity provider (IDP) that is supported by OIDC.

In order to connect your Google or Azure IDP you need to create and provide some credentials. This post will show you what information you need to send to us and where to find it.

Azure AD

  1. Go to and click Add an app in the Azure portal.
  2. Click New registration.
  3. Under Supported account types pick Accounts in any organizational directory (Any Azure AD directory – Multitenant).
  4. Under Redirect URI select web and insert the dex URL that we provide, if unsure ask your contact person at Elastisys.
  5. In Overview you have the application ID.
  6. To create the secret go to Certificates & secrets.
  7. Select the tab Client secret and press New client secret.
  8. Set expiry date to 24 months.
  9. Send the application ID and secret to us via e.g.
  10. To make it more secure, navigate to Properties in Azure AD and send us the tenant ID. This limits who can authenticate towards the cluster.
  11. Provide the name of the Azure AD group that should have admin privileges in the cluster.


  1. To create the credentials go to
  2. Create a new project through the top menu.
  3. In the new project, go to OAuth consent screen on the left side menu and create an internal consent screen.
  4. Go to Enabled APIs & services on the left side menu and then click + ENABLE APIS AND SERVICES.
  5. Search for Admin SDK API and enable the API.
  6. Go back to Credentials on the left side menu.
  7. Click + CREATE CREDENTIALS of type OAuth client ID.
  8. Select Web Application for Application type, give it a suitable name and set the Authorized redirect URIs to the dex URL that we provide, if unsure ask your contact person at Elastisys.
  9. Send the client ID and client secret to us e.g. via

To set up groups follow these steps, note that steps 7-9 below can only be done by an administrator.

  1. Go to
  2. Make sure that you are in the same project that you created previously (see top menu).
  3. Click on + CREATE SERVICE ACCOUNT and give it a suitable name.
  4. Note down the Unique ID of the service account as you will need it soon.
  5. Go to the newly created service account and then under the KEYS tab click ADD KEY and create a new key of type JSON.
  6. Send the content of the JSON file to us via e.g.
  7. You need to give the service account read access to groups, go to the admin console
  8. Navigate through the menu to Security > Access and data control > API Controls and click Manage Domain Wide Delegation and then Add New.
  9. In the Client ID field put the Unique ID of the service account from step 4 and in the Oauth Scopes field enter this scope:
  10. Finally provide the name of the Google group that should have admin privileges in the cluster.