Skip to content

Commit

Permalink
MC-2733 Simplify OIDC configuration (#319)
Browse files Browse the repository at this point in the history
Co-authored-by: rebekah-lawrence <[email protected]>
  • Loading branch information
Sodik and rebekah-lawrence authored Jun 14, 2024
1 parent 54934bf commit 8dcccf4
Show file tree
Hide file tree
Showing 2 changed files with 7 additions and 3 deletions.
Binary file modified docs/modules/ROOT/images/ConfigureOIDC.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
10 changes: 7 additions & 3 deletions docs/modules/deploy-manage/pages/openid.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@

To set up OpenID Connect, you need to configure settings either in the UI or the `hz-mc conf` tool.

[tabs]
[tabs]
====
UI::
+
Expand All @@ -28,19 +28,23 @@ hz-mc conf oidc configure
.Windows
```bash
mc-conf.bat oidc configure
mc-conf.bat oidc configure
```
--
====

* **Issuer:** Identifies the issuer of your OpenID provider. It is usually (but not always) a URL.
When an issuer URL is provided, you can fetch the OIDC configuration by clicking the `Fetch Configuration` button.
+
IMPORTANT: Fetching the configuration overrides any previously typed values
(*Authorization Endpoint*, *User Info Endpoint*, *Token Endpoint* and *JWK Set Endpoint*).

* **Client ID:** The OAuth2 client ID that you obtain from your OpenID provider.
* **Client Secret:** The OAuth2 client secret you obtain from your OpenID provider.
* **Authorization Endpoint:** Authorization endpoint URL of your OpenID provider.
* **User Info Endpoint:** User info endpoint URL of your OpenID provider.
* **Token Endpoint:** Token endpoint URL of your OpenID provider.
* **JWK Set Endpoint:** JWK set endpoint URL of your OpenID provider.
* **Issuer:** Issuer identifier of your OpenID provider. It is usually (but not always) a URL.
* **Redirect URL:** URL of the Management Center endpoint that handles responses to authentication
requests, including schema (`http://` or `https://`) and port. It is located under the path
`/oidc/auth`, so you should append `/oidc/auth` to the Management Center URL.
Expand Down

0 comments on commit 8dcccf4

Please sign in to comment.