-
Notifications
You must be signed in to change notification settings - Fork 151
Adding an oidc-proxy example #192
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
| ## Setting up an OIDC SSO configuration | ||
|
|
||
| ### Github.com OIDC SSO | ||
|
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Here it makes sense to have some explanation around the scanario, something like.
One publicly available OIDC provider is GitHub. Users accessing your application will authenticate with their GitHub identity.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I added a few more sentences to make the reader aware on what happens in the section and the subsection. Thanks for pointing that out
auth-oidc-proxy/README.md
Outdated
| OIDC_PROVIDER_TOKEN_ENDPOINT=https://github.com/login/oauth/access_token | ||
| OIDC_PROVIDER_USERINFO_ENDPOINT=https://api.github.com/user | ||
| ``` | ||
| * To add authorization checks one can either check for a specific user property |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sentence incomplete.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good catch! I slightly adjusted the sentence
To add authorization checks, one can check for a specific user property
Co-authored-by: Sascha Schwarze <[email protected]>
Co-authored-by: Sascha Schwarze <[email protected]>
Co-authored-by: Sascha Schwarze <[email protected]>
Co-authored-by: Sascha Schwarze <[email protected]>
Co-authored-by: Sascha Schwarze <[email protected]>
Co-authored-by: Sascha Schwarze <[email protected]>
Co-authored-by: Sascha Schwarze <[email protected]>
Co-authored-by: Sascha Schwarze <[email protected]>
Co-authored-by: Sascha Schwarze <[email protected]>
SaschaSchwarze0
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please sign your commits.
Co-authored-by: Sascha Schwarze <[email protected]>
Co-authored-by: Sascha Schwarze <[email protected]>
The following sample demonstrates an SSO proxy pattern implemented with OIDC