...
Page Properties | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||||
Resources & Remarks Modification History
|
Excerpt |
---|
When updating your yuuvis® Momentum installation to version 2021 Autumn, manual configuration changes are required for some services. |
Please also pay attention to the Breaking Changes.
Section | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
|
Core
Cross-Tenant Service Accounts
In order to allow for the configuration and usage of Cross-Tenant Service Accounts, an ancillary Kubernetes Service has to be created as follows.
Create a file
authentication-internal.yml
with the following content:Code Block language yml
...
apiVersion:
...
v1
...
kind:
...
Service metadata:
...
labels:
...
...
...
app: yuuvis
...
name: authentication-internal
...
name:
...
authentication-internal spec: ports: -
...
name:
...
"80" port: 80 targetPort: 8081
...
Run the command:
...
language | powershell |
---|
...
...
...
Note | ||
---|---|---|
| ||
The AUTHENTICATION service manages the cross-tenant requests of service accounts via the separate port |
Excerpt |
---|
When updating your yuuvis® Momentum installation to version 2021 Autumn, manual configuration changes are required for some services. |
Column | ||||||
---|---|---|---|---|---|---|
Table of Contents
|
Core
Configuration Changes for the AUTHENTICATION Service
Cross-Tenant Service Accounts
In order to allow for the configuration and usage of Cross-Tenant Service Accounts, an ancillary Kubernetes Service has to be created as follows.
Create a file
authentication-internal.yml
with the following content:Code Block language yml kind: Service apiVersion: v1 metadata: name: authentication-internal spec: selector: app selector: name: authentication type: ClusterIP ports: - protocol: TCP port: 80 targetPort: 8081
Run the command:
Code Block language powershell kubectl -n yuuvis apply -f authentication-internal.yml
Note | ||
---|---|---|
| ||
The AUTHENTICATION service manages the cross-tenant requests of service accounts via the separate port |
Anchor | ||||
---|---|---|---|---|
|
Access to '/manage/**' Endpoints
The /manage/**
endpoints provided by the AUTHENTICATION Service are now available via a separate port that is protected from external access. Especially for customers using the Tenant Management services, the configuration of the AUTHENTICATION Service has to be adjusted and an ancillary Kubernetes Service has to be created as follows.
...