Skip to content

Commit d772e76

Browse files
authored
Merge pull request #36709 from gaeljw/patch-1
docs: update OIDC documentation to mention the signing algorithms configuration
2 parents 91ecbb9 + 699ed97 commit d772e76

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

content/en/docs/reference/access-authn-authz/authentication.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -321,6 +321,7 @@ To enable the plugin, configure the following flags on the API server:
321321
| `--oidc-groups-prefix` | Prefix prepended to group claims to prevent clashes with existing names (such as `system:` groups). For example, the value `oidc:` will create group names like `oidc:engineering` and `oidc:infra`. | `oidc:` | No |
322322
| `--oidc-required-claim` | A key=value pair that describes a required claim in the ID Token. If set, the claim is verified to be present in the ID Token with a matching value. Repeat this flag to specify multiple claims. | `claim=value` | No |
323323
| `--oidc-ca-file` | The path to the certificate for the CA that signed your identity provider's web certificate. Defaults to the host's root CAs. | `/etc/kubernetes/ssl/kc-ca.pem` | No |
324+
| `--oidc-signing-algs` | The signing algorithms accepted. Default is "RS256". | `RS512` | No |
324325

325326
Importantly, the API server is not an OAuth2 client, rather it can only be
326327
configured to trust a single issuer. This allows the use of public providers,

0 commit comments

Comments
 (0)