X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/9a71dd94cb72a5fd1ed74ca71b4961de4108db02..664b5469124c6936733ce6544393f3883b86a32f:/doc/install/setup-login.html.textile.liquid diff --git a/doc/install/setup-login.html.textile.liquid b/doc/install/setup-login.html.textile.liquid index 3fe442c75b..aec82cfe2a 100644 --- a/doc/install/setup-login.html.textile.liquid +++ b/doc/install/setup-login.html.textile.liquid @@ -12,6 +12,7 @@ SPDX-License-Identifier: CC-BY-SA-3.0 Select one of the following login mechanisms for your cluster. # If all users will authenticate with Google, "configure Google login":#google. +# If all users will authenticate with an OpenID Connect provider (other than Google), "configure OpenID Connect":#oidc. # If all users will authenticate with an existing LDAP service, "configure LDAP":#ldap. # If all users will authenticate using PAM as configured on your controller node, "configure PAM":#pam. @@ -42,6 +43,21 @@ Use the Google D ClientSecret: "zzzzzzzzzzzzzzzzzzzzzzzz" +h2(#oidc). OpenID Connect + +With this configuration, users will sign in with a third-party OpenID Connect provider. The provider will supply appropriate values for the issuer URL, client ID, and client secret config entries. + +
+    Login:
+      OpenIDConnect:
+        Enable: true
+        Issuer: https://accounts.example.com/
+        ClientID: "0123456789abcdef"
+        ClientSecret: "zzzzzzzzzzzzzzzzzzzzzzzz"
+
+ +Check the OpenIDConnect section in the "default config file":{{site.baseurl}}/admin/config.html for more details and configuration options. + h2(#ldap). LDAP With this configuration, authentication uses an external LDAP service like OpenLDAP or Active Directory.