When Pinniped authentication is enabled, the tanzu cluster kubeconfig get command returns a kubeconfig file that's configured to run the Tanzu pinniped-auth plugin
The plugin initiates the Pinniped authentication workflow
Users will be redirected to the Pinniped supervisor endpoint on the management cluster
Tanzu CLI realises that the user requesting doesn't have a token for authentication; opens a web browser to the Pinniped supervisor - redirecting to the Dex Login Page
The user provides their LDAP credentials and Dex authenticates with the LDAP server → Redirecting to Pinniped Supervisor
Pinniped Supervisor generates an ID token and passes it to the Tanzu CLI
The Tanzu CLI sends the token to Pinniped concierge on the workload cluster
Pinniped concierge swaps the ID token for client certificate via the Pinniped supervisor
The client certificate is passed to the Tanzu CLI
The client certificate is passed to kubectl
kubectl sends the client certificate with its request, the client certificate is already now trusted by the cluster and the user is authenticated.