Skip to content

Commit 2d5209b

Browse files
author
vibhuti sodhi
committed
MTA-3367 RHSSO admin info
1 parent ad5eba7 commit 2d5209b

File tree

1 file changed

+15
-8
lines changed

1 file changed

+15
-8
lines changed

docs/topics/mta-7-installing-web-console-on-openshift.adoc

Lines changed: 15 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -233,17 +233,24 @@ The amount of memory available for running pods on this node is 28.9 GiB. This a
233233
[id="mta-7-red-hat-single-sign-on_{context}"]
234234
== Red Hat Single Sign-On
235235

236-
{ProductShortName} delegates authentication and authorization to a
237-
https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6[Red
238-
Hat Single Sign-On] (RHSSO) instance managed by the {ProductShortName} operator. Aside from controlling the full lifecycle of the managed RHSSO instance, the {ProductShortName} operator also manages the configuration of a dedicated
239-
https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms[realm] that contains all the roles and permissions that {ProductShortName} requires.
236+
The {ProductShortName} uses link:https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6[Red
237+
Hat Single Sign-On] (RHSSO) instance for user authentication and authorization.
240238

241-
If an advanced configuration is required in the {ProductShortName} managed RHSSO instance, such as https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/user-storage-federation#adding_a_provider[adding a provider for User Federation] or https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/identity_broker[integrating identity providers], users can log into the RHSSO https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms#using_the_admin_console[Admin Console] through the `/auth/admin` subpath in the `{LC_PSN}-ui` route. The admin credentials to access the {ProductShortName} managed RHSSO instance can be retrieved from the `credential-mta-rhsso` secret available in the namespace in which the {WebName} was installed.
239+
The {ProductShortName} operator manages the RHSSO instance and configures a dedicated link:https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms[realm] with necessary roles and permissions.
242240

243-
A dedicated route for the {ProductShortName} managed RHSSO instance can be created by setting the `rhsso_external_access` parameter to `True` in the *Tackle CR* that manages the {ProductShortName} instance.
241+
{ProductShortName}-managed RHSSO instance allows you to perform advanced RHSSO configurations, such as link:https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/user-storage-federation#adding_a_provider[adding a provider for User Federation] or link:https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/identity_broker[integrating identity providers]. To access the link:https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/configuring_realms#using_the_admin_console[RHSSO Admin Console], enter the URL https://<_route_>/auth/admin in your browser by replacing <route> with the {ProductShortName} address.
244242

245-
For more information, see
246-
https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/red_hat_single_sign_on_features_and_concepts[Red Hat Single Sign-On features and concepts].
243+
The admin credentials for RHSSO are stored in a secret file named `credential-mta-rhsso` in the namespace where {ProductShortName} is installed.
244+
245+
To retrieve your admin credentials, run the following command:
246+
----
247+
oc get secret credential-mta-rhsso -o yaml
248+
----
249+
250+
To create a dedicated route for the RHSSO instance, set the `rhsso_external_access` parameter to `True` in the Tackle CR for {ProductShortName}.
251+
252+
.Additional resources
253+
link:https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.6/html/server_administration_guide/red_hat_single_sign_on_features_and_concepts[Red Hat Single Sign-On features and concepts]
247254

248255
[id="mta-roles-personas-users-permissions_{context}"]
249256
=== Roles, Personas, Users, and Permissions

0 commit comments

Comments
 (0)