Skip to content

Commit 0db3858

Browse files
muraeetypeid
andauthored
fix typos
Co-authored-by: typeid <[email protected]>
1 parent d9a348f commit 0db3858

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

docs/book/src/topics/rosa/external-auth.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,9 +32,9 @@ spec:
3232
externalAuthProviders:
3333
- name: my-oidc-provider
3434
issuer:
35-
issuerURL: https://login.microsoftonline.com/<tenant-id>/v2.0 # e.g. if using Micorsoft Entra ID
35+
issuerURL: https://login.microsoftonline.com/<tenant-id>/v2.0 # e.g. if using Microsoft Entra ID
3636
audiences: # audiences that will be trusted by the kube-apiserver
37-
- "audience1" # usaully the client ID
37+
- "audience1" # usually the client ID
3838
claimMappings:
3939
username:
4040
claim: email
@@ -50,9 +50,9 @@ Note: `oidcProviders` only accepts one entry at the moment.
5050

5151
### Setting up RBAC
5252

53-
When `enableExternalAuthProviders` is set to `true`, ROSA provider will generate a temporarily admin kubeconfig secert in the same namespace named `<cluster-name>-bootstrap-kubeconfig`. This kubeonconfig can be used to access the cluster to setup RBAC for oidc users/groups.
53+
When `enableExternalAuthProviders` is set to `true`, ROSA provider will generate a temporary admin kubeconfig secret in the same namespace named `<cluster-name>-bootstrap-kubeconfig`. This kubeconfig can be used to access the cluster to setup RBAC for OIDC users/groups.
5454

55-
For example, bind the `cluster-admin` to an oidc group, to give admin permissions to all users part of that group:
55+
The following example binds the `cluster-admin` role to an OIDC group, giving all users in that group admin permissions.
5656
```shell
5757
kubectl get secret <cluster-name>-bootstrap-kubeconfig -o jsonpath='{.data.value}' | base64 -d > /tmp/capi-admin-kubeconfig
5858
export KUBECONFIG=/tmp/capi-admin-kubeconfig
@@ -69,7 +69,7 @@ The [kubelogin kubectl plugin](https://github.com/int128/kubelogin/tree/master)
6969
### Configuring OpenShift Console
7070

7171
The OpenShift Console needs to be configured before it can be used to authenticate and login to the cluster.
72-
1. Setup a new client in your OIDC provider with the following Redirect URL `<console-url>/auth/callback`. You can find the console URL in the status field of the `ROSAControlPlane` once the cluster is ready:
72+
1. Setup a new client in your OIDC provider with the following Redirect URL: `<console-url>/auth/callback`. You can find the console URL in the status field of the `ROSAControlPlane` once the cluster is ready:
7373
```shell
7474
kubectl get rosacontrolplane <control-plane-name> -o jsonpath='{.status.consoleURL}'
7575
```
@@ -91,7 +91,7 @@ The OpenShift Console needs to be configured before it can be used to authentica
9191
externalAuthProviders:
9292
- name: my-oidc-provider
9393
issuer:
94-
issuerURL: https://login.microsoftonline.com/<tenant-id>/v2.0 # e.g. if using Micorsoft Entra ID
94+
issuerURL: https://login.microsoftonline.com/<tenant-id>/v2.0 # e.g. if using Microsoft Entra ID
9595
audiences: # audiences that will be trusted by the kube-apiserver
9696
- "audience1"
9797
- <console-client-id> # <----New

0 commit comments

Comments
 (0)