@@ -6,10 +6,14 @@ description: How to configure OIDC
6
6
import { Steps , Callout } from " nextra/components" ;
7
7
8
8
<Callout type = " warning" >
9
- ** Warning:** With the actual implementation of the OIDC provider, GitHub login
9
+ ** Warning:** With the actual implementation of the OIDC provider, GitHub / Google login
10
10
provider will be disabled.
11
11
</Callout >
12
12
13
+ <Callout type = " warning" >
14
+ ** Warning:** Do not use any trailing slashes ("/") at the end of any OIDC Variables.
15
+ </Callout >
16
+
13
17
If you want to use OAuth/OIDC, please follow the instructions below.
14
18
15
19
We will use [ Authentik] ( https://goauthentik.io/ ) as an OIDC provider example, with base URL ` https://authentik.example.com `
@@ -20,15 +24,17 @@ We will use [Authentik](https://goauthentik.io/) as an OIDC provider example, wi
20
24
21
25
You will find the following important information:
22
26
27
+ - ` redirect_uri ` => ` https://postiz.yourserver.com/settings `
28
+
23
29
- ` client_id ` => ` randomclientid `
24
30
25
31
- ` client_secret ` => ` randomclientsecret `
26
32
27
- - ` auth_url ` => ` https://authentik.example.com/application/o/authorize/ `
33
+ - ` auth_url ` => ` https://authentik.example.com/application/o/authorize `
28
34
29
- - ` token_url ` => ` https://authentik.example.com/application/o/token/ `
35
+ - ` token_url ` => ` https://authentik.example.com/application/o/token `
30
36
31
- - ` userinfo_url ` => ` https://authentik.example.com/application/o/userinfo/ `
37
+ - ` userinfo_url ` => ` https://authentik.example.com/application/o/userinfo `
32
38
33
39
** Note** : the same information needs to be configured on other OIDC providers such as Keycloak, Dex, etc.
34
40
0 commit comments