11// Module is included in the following assemblies:
22//
3- // *
3+ // * cicd/gitops/configuring-sso-for-argo-cd-on-openshift.adoc
44
55[id="configuring-argo-cd-oidc_{context}"]
66= Configuring Argo CD OIDC
@@ -9,7 +9,7 @@ To configure Argo CD OpenID Connect (OIDC), you must generate your client secret
99
1010.Prerequisites
1111
12- * You have obtained your client secret.
12+ * You have obtained your client secret.
1313
1414.Procedure
1515
@@ -25,18 +25,19 @@ $ echo -n '83083958-8ec6-47b0-a411-a8c55381fbd2' | base64
2525.. Edit the secret and add the base64 value to an `oidc.keycloak.clientSecret` key:
2626+
2727[source,terminal]
28- ----
29- $ oc edit secret openshift-gitops -secret -n <namespace>
28+ ----
29+ $ oc edit secret argocd -secret -n <namespace>
3030----
3131+
3232.Example YAML of the secret
3333[source,yaml]
3434----
35- yaml apiVersion: v1
36- kind: Secret
37- metadata: name: argocd-secret
35+ apiVersion: v1
36+ kind: Secret
37+ metadata:
38+ name: argocd-secret
3839data:
39- oidc.keycloak.clientSecret: ODMwODM5NTgtOGVjNi00N2IwLWE0MTEtYThjNTUzODFmYmQy …
40+ oidc.keycloak.clientSecret: ODMwODM5NTgtOGVjNi00N2IwLWE0MTEtYThjNTUzODFmYmQy
4041----
4142
4243. Edit the `argocd` custom resource and add the OIDC configuration to enable the Keycloak authentication:
7475 route:
7576 enabled: true
7677----
77- <1> `issuer` must end with the correct realm name (in this example `myrealm`).
78+ <1> `issuer` must end with the correct realm name (in this example `myrealm`).
7879<2> `clientID` is the Client ID you configured in your Keycloak account.
79- <3> `clientSecret` points to the right key you created in the argocd-secret secret.
80+ <3> `clientSecret` points to the right key you created in the argocd-secret secret.
8081<4> `requestedScopes` contains the groups claim if you did not add it to the Default scope.
0 commit comments