[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-08-04 (世界標準時間)。"],[],[],null,["# Configure the identity provider of your choice\n==============================================\n\nThis document is for platform administrators who are responsible for setting up\nand managing identity within your organization. If you're a cluster administrator or application\noperator, ask your platform administrator to complete the setup described\nhere before you configure individual clusters or use the fleet setup.\n\nBefore you begin\n----------------\n\nIf you want cluster administrators to provide authentication access using the\nfully qualified domain name (FQDN) of the cluster's Kubernetes API server\n(recommended), do the following. Otherwise, you can skip ahead to\n[configuring your identity provider](#configidp). You can learn more about user\nauthentication methods in [Set up an authentication method for user access](/kubernetes-engine/enterprise/identity/setup/user-access).\n\n- Configure your domain name service (DNS) to resolve your chosen fully qualified domain name to the cluster's control plane VIPs (virtual IP addresses). Users can access the cluster using this domain name.\n- Use a Server Name Indication (SNI) certificate issued by your trusted enterprise Certificate Authority (CA). This certificate specifically mentions your FQDN as a valid domain, eliminating potential certificate warnings for users. You can provide the SNI certificate during cluster creation. For more information on specifying SNI certificates, see [SNI certificate authentication](/anthos/clusters/docs/on-prem/latest/how-to/user-cluster-configuration-file#authentication-sni-section).\n- If SNI certificates are not feasible, cluster administrators need to configure all user devices to trust the cluster-CA certificate. This avoids certificate warnings but requires distributing the cluster-CA certificate to all users.\n\nFor more information on user login access using these certificates, see [Authenticate using FQDN access](/kubernetes-engine/enterprise/identity/setup/user-access#alternativeuserloginaccess).\n\nConfigure the identity provider\n-------------------------------\n\nThe configuration of GKE Identity Service depends on the identity\nprovider you choose to use. To get started, choose the appropriate provider you want to configure:\n\n- [Configure OIDC providers](/kubernetes-engine/enterprise/identity/setup/provider)\n- [Configure SAML providers](/kubernetes-engine/enterprise/identity/setup/saml-provider)\n- [Configure LDAP providers](/kubernetes-engine/enterprise/identity/setup/provider-ldap)"]]