@@ -6,10 +6,14 @@ description: How to configure OIDC
66import { Steps , Callout } from " nextra/components" ;
77
88<Callout type = " warning" >
9- ** Warning:** With the actual implementation of the OIDC provider, GitHub login
9+ ** Warning:** With the actual implementation of the OIDC provider, GitHub / Google login
1010 provider will be disabled.
1111</Callout >
1212
13+ <Callout type = " warning" >
14+ ** Warning:** Do not use any trailing slashes ("/") at the end of any OIDC Variables.
15+ </Callout >
16+
1317If you want to use OAuth/OIDC, please follow the instructions below.
1418
1519We will use [ Authentik] ( https://goauthentik.io/ ) as an OIDC provider example, with base URL ` https://authentik.example.com `
@@ -20,15 +24,17 @@ We will use [Authentik](https://goauthentik.io/) as an OIDC provider example, wi
2024
2125You will find the following important information:
2226
27+ - ` redirect_uri ` => ` https://postiz.yourserver.com/settings `
28+
2329- ` client_id ` => ` randomclientid `
2430
2531- ` client_secret ` => ` randomclientsecret `
2632
27- - ` auth_url ` => ` https://authentik.example.com/application/o/authorize/ `
33+ - ` auth_url ` => ` https://authentik.example.com/application/o/authorize `
2834
29- - ` token_url ` => ` https://authentik.example.com/application/o/token/ `
35+ - ` token_url ` => ` https://authentik.example.com/application/o/token `
3036
31- - ` userinfo_url ` => ` https://authentik.example.com/application/o/userinfo/ `
37+ - ` userinfo_url ` => ` https://authentik.example.com/application/o/userinfo `
3238
3339** Note** : the same information needs to be configured on other OIDC providers such as Keycloak, Dex, etc.
3440
0 commit comments