Register an app with AppSSO


Client registration

Applications/Clients must register with AppSSO to allow users to sign in with single sign on within a Kubernetes cluster. This registration will result in the creation of a Kubernetes secret

To do this, apply a ClientRegistration to the appropriate Kubernetes cluster.

To confirm that the ClientRegistration was successfully processed, check the status:

kubectl describe <client-name>

It is also possible, but not recommended, to register clients statically while deploying AppSSO.

Note: It is recommended to register clients dynamically after AppSSO has been deployed. When registering a client statically, properties cannot be changed without triggering a rollout of AppSSO itself.

Grant Types


This guide will walk you through steps necessary to secure your deployed Workload with AppSSO.


Before attempting to integrate your workload with AppSSO, please ensure that the following items are addressed:

  • Tanzu Application Platform (TAP) v1.2.0 or above is available on your cluster.
  • Tanzu CLI v0.11.6 or above is available on your command line.
  • AppSSO package v1.0.0-beta.5 or above is available on your cluster.

Configuring a Workload with AppSSO

AppSSO and your Workload need to establish a bidirectional relationship: AppSSO is aware of your Workload and your Workload is aware of AppSSO. How does that work?

  • To make AppSSO aware of your Workload (i.e. that AppSSO should be responsible for authentication and authorization duties), you have to create and apply a ClientRegistration resource .
  • To make your Workload aware of AppSSO (i.e. that your application shall now rely on AppSSO for authentication and authorization requests), you must specify a service resource claim which produces the necessary credentials for your Workload to consume.

The following sections elaborate on both of the concepts in detail.

Create and apply a ClientRegistration resource

Define a ClientRegistration resource for your Workload. Here is an example:

kind: ClientRegistration
  name: my-workload-client-registration
  namespace: my-workload-namespace
    # ask your Service Operator for labels to target an `AuthServer`
    - client_credentials
    - authorization_code
    - refresh_token
  clientAuthenticationMethod: basic
  requireUserConsent: true
    - "<MY_WORKLOAD_HOSTNAME>/redirect-back-uri"
    - name: openid

Once applied successfully, this resource will create the appropriate credentials for your Workload to consume. More on this in the next section.

Please refer to the ClientRegistration custom resource documentation page for additional details on schema and specification of the resource.

Add a service resource claim to your Workload

Once a ClientRegistration resource has been defined, you can now create a service resource claim by using Tanzu CLI:

tanzu service claim create my-client-claim \
  --namespace my-workload-namespace \
  --resource-api-version \
  --resource-kind ClientRegistration \
  --resource-name my-workload-client-registration \
  --resource-namespace my-workload-namespace

Alternatively, you may create the claim as a ResourceClaim custom resource:

kind: ResourceClaim
  name: my-client-claim
  namespace: my-workload-namespace
    kind: ClientRegistration
    name: my-workload-client-registration
    namespace: my-workload-namespace

Observe the status of the service resource claim by running tanzu service claim list -n my-workload-namespace -o wide:

NAMESPACE              NAME             READY  REASON  CLAIM REF
my-workload-namespace  my-client-claim  True 

The created service resource claim is now referable within a Workload:

kind: Workload
  labels: web
  name: my-workload
  namespace: my-workload-namespace
        branch: main
      url: ssh://
    - name: my-client
        kind: ResourceClaim
        name: my-client-claim

Alternatively, you can refer to your ClientRegistration when deploying your workload with the tanzu CLI. Like so

tanzu apps workload create my-workload \
  --service-ref "" \
  # ...

What this service claim reference binding does under the hood is ensures that your Workload’s Pod is mounted with a volume containing the necessary credentials required by your application to become aware of AppSSO. Learn more about Service Bindings.

The credentials provided by the service claim are:

  • Client ID - the identifier of your Workload that AppSSO is registered with. This is a unique identifier.
  • Client Secret - secret string value used by AppSSO to verify your client during its interactions. Keep this value secret.
  • Issuer URI - web address of AppSSO, and the primary location that your Workload will go to when interacting with AppSSO.
  • Authorization Grant Types - list of desired OAuth 2 grant types that your wants to support.
  • Client Authentication Method - method in which the client application requests an identity or access token
  • Scopes - list of desired scopes that your application’s users will have access to.

The above credentials are mounted onto your Workload’s Pod(s) as individual files at the following locations:


Taking our example from above, the location of credentials can be found at:


Given these auto-generated values, your Workload is now able to load them at runtime and bind to AppSSO at start-up time. Reading the values from the file system is left to the implementor as to the approach taken.

check-circle-line exclamation-circle-line close-line
Scroll to top icon