This guide provides instructions on how to generate various credentials related to F5® Distributed Cloud Services from the platform.
F5® Distributed Cloud Console provides two types of credentials:
-
My credentials
: Are generated and used for different authentication and authorization purposes while accessing F5® Distributed Cloud Services APIs or deploying apps using F5® Distributed Cloud Services vK8s. -
Service credentials
: Are generated by administrators to create custom service roles that are associated with service users.
Note: The
My Credentials
inherit the roles of the users. In case of service credentials, you can assign specific roles to the service user.
Using the instructions provided in this guide, you can create various types of credentials and download them for using in API requests.
The following prerequisites apply:
- A valid Account is required.
- Note: If you do not have an account, visit Create an Account.
- A single-node or multi-node F5® Distributed Cloud Services site in case of application deployment.
- Note: If you do not have a site, visit Site Management.
My Credentials
options can be generated and downloaded from the Console:
-
API Tokens: The tokens are used in site deployment, and also for the authorization in the API requests.
-
X.509 Certificates: These certificates are used in API requests.
-
vK8s KubeConfig: These are the vK8s KubeConfigs for deploying your applications using F5® Distributed Cloud Services vK8s.
Note: You can use either API certificate or API token for authenticating. It is recommended to use API certificates as they offer more robust security via Mutual TLS (mTLS) authentication. The API tokens are used with one-way TLS authentication.
Features can be viewed, and managed in multiple services.
This example shows Credentials
setup in Administration
.
Step 1: Open F5® Distributed Cloud Console
> select Create Credentials
.
- Open
F5® Distributed Cloud Console
homepage, selectAdministration
box.
- Select
Personal Management
in left column menu > selectCredentials
>+ Create Credentials
.
Step 2: Configure Credential type.
-
Enter
Name
for your certificate. -
Select
vK8s KubeConfig
inCredential type
drop-down menu. -
Select
Namespace
option in drop-down menu. -
Select
vK8s cluster name
option in drop-down menu. -
Select
Expiry date
from calendar drop-down.
Step 3: Generate and download vK8s KubeConfig
Certificate.
- Select
Download
button to generate and download vK8s KubeConfig certificate file.
Note: The maximum allowed expiry date for users is set by the tenant administrator. The system allows the administrator to set a maximum expiry of 365 days. The default expiry is 90 days.
- Use in deployments after generating.
Now right click on the tasks and choose to run all the tasks as follows:
Watch for a HTTP 200 response message code back in the response header