You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
NOTE: Learn more in the xref:tutorials:authentication_with_openldap.adoc[OpenLDAP tutorial] and get a full overview of all the properties in the {crd-docs}/authentication.stackable.tech/authenticationclass/v1alpha1/#spec-provider-ldap[AuthenticationClass LDAP provider CRD reference].
38
39
40
+
[#OIDC]
41
+
=== OpenID Connect
42
+
43
+
An OIDC provider like https://www.keycloak.org/[Keycloak {external-link-icon}^] could be configured as follows:
<2> Port of the identity provider. If TLS is used defaults to 443, otherwise to 80.
52
+
<3> Root HTTP path of the identity provider. Defaults to `/`.
53
+
<4> Scopes to request from your identity provider. It is recommended to request the `openid`, `email`, and `profile` scopes.
54
+
<5> If a product extracts some sort of "effective user" that is represented by a string internally, this config determines which claim is used to extract that string.
55
+
<6> This is a hint about which identity provider is used by the AuthenticationClass.
56
+
57
+
NOTE: Get a full overview of all the properties in the {crd-docs}/authentication.stackable.tech/authenticationclass/v1alpha1/#spec-provider-oidc[AuthenticationClass OIDC provider CRD reference].
58
+
39
59
[#tls]
40
60
=== TLS
41
61
The `TLS` provider configures a product to authenticate users using TLS certificates.
0 commit comments