File tree Expand file tree Collapse file tree 1 file changed +33
-0
lines changed
Expand file tree Collapse file tree 1 file changed +33
-0
lines changed Original file line number Diff line number Diff line change @@ -68,6 +68,39 @@ If there is only one upstream provider configured and the local password databas
6868
6969This section contains sample configurations for popular OIDC providers.
7070
71+ ### Apple
72+
73+ Sign-in with Apple uses special non-standard for authenticating clients, which requires a special configuration.
74+
75+ ``` yaml
76+ upstream_oauth2 :
77+ providers :
78+ - client_id : 01JAYS74TCG3BTWKADN5Q4518C
79+ client_name : " <Service ID>" # TO BE FILLED
80+ scope : " openid name email"
81+ response_mode : " form_post"
82+
83+ token_endpoint_auth_method : " sign_in_with_apple"
84+ sign_in_with_apple :
85+ private_key : |
86+ # Content of the PEM-encoded private key file, TO BE FILLED
87+ team_id : " <Team ID>" # TO BE FILLED
88+ key_id : " <Key ID>" # TO BE FILLED
89+
90+ claims_imports :
91+ localpart :
92+ action : ignore
93+ displayname :
94+ action : suggest
95+ # SiWA passes down the user infos as query parameters in the callback
96+ # which is available in the extra_callback_parameters variable
97+ template : |
98+ {%- set user = extra_callback_parameters["user"] | from_json -%}
99+ {{- user.name.firstName }} {{ user.name.lastName -}}
100+ email :
101+ action : suggest
102+ ` ` `
103+
71104### Authelia
72105
73106These instructions assume that you have already enabled the OIDC provider support in [Authelia](https://www.authelia.com/).
You can’t perform that action at this time.
0 commit comments