Skip to content

Commit 9415acb

Browse files
authored
docs: Added okta dex oidc example (#1281)
1 parent 9cde04b commit 9415acb

File tree

3 files changed

+49
-14
lines changed

3 files changed

+49
-14
lines changed
235 KB
Loading
169 KB
Loading

docs/reference/self-hosted/examples.md

Lines changed: 49 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -14,16 +14,18 @@ For Azure, we recommend creating an [OpenID connector](https://dexidp.io/docs/co
1414

1515
- Follow the steps to create the Azure App at [Azure Docs](https://learn.microsoft.com/en-us/power-pages/security/authentication/openid-settings#create-an-app-registration-in-azure)
1616

17-
- Make sure to set the RedirectURI to ```<logfire_url>/auth-api/callback```
17+
- Make sure to set the **RedirectURI** to ```<logfire_url>/auth-api/callback```
1818
- Make sure to copy the secret value when you create it
1919

2020
- To finish the configuration on your Helm values file, you will need:
21-
- Directory (Tenant) ID and Application (client) ID, you can get both of these from the Azure App overview page
21+
- Directory (Tenant) ID and Application (client) ID, you can get both of these from the Azure App overview page
2222
- The client secret value you copied on the previous step
2323

2424
It should look something like this:
2525
```yaml
26-
connectors:
26+
logfire-dex:
27+
...
28+
connectors:
2729
- type: oidc
2830
id: azuread
2931
name: Microsoft
@@ -53,16 +55,49 @@ For GitHub you can use the [GitHub connector](https://dexidp.io/docs/connectors/
5355

5456
- On your values file:
5557
```yaml
56-
logfire-dex:
57-
...
58+
logfire-dex:
59+
...
5860
config:
59-
connectors:
60-
- type: "github"
61-
id: "github"
62-
name: "GitHub"
63-
config:
64-
# You get clientID and clientSecret by creating a GitHub OAuth App
65-
# See https://docs.github.com/en/apps/oauth-apps/building-oauth-apps/creating-an-oauth-app
66-
clientID: client_id
67-
clientSecret: client_secret
61+
connectors:
62+
- type: github
63+
id: github
64+
name: GitHub
65+
config:
66+
# You get clientID and clientSecret by creating a GitHub OAuth App
67+
# See https://docs.github.com/en/apps/oauth-apps/building-oauth-apps/creating-an-oauth-app
68+
clientID: client_id
69+
clientSecret: client_secret
70+
```
71+
72+
### Okta
73+
74+
we recommend creating an [OpenID connector](https://dexidp.io/docs/connectors/oidc/).
75+
76+
- Follow the steps for creating an OIDC Okta App at [Okta Docs](https://help.okta.com/en-us/content/topics/apps/apps_app_integration_wizard_oidc.htm)
77+
- Set **Web Application** as the Application type
78+
- Set **Sign-in redirect URIs** to ```<logfire_url>/auth-api/callback```
79+
80+
![Okta OIDC App](../../images/self-hosted/dex-okta-oidc-app.png)
81+
82+
- After creating the app:
83+
- Copy the Client ID from the **General** tab
84+
- Copy the Secret value
85+
- Go to the **Sign On** tab, click **Edit** at the **OpenID Connect ID Token** section and change **Issuer** from **Dynamic** to **Okta URL**, then copy the URL
86+
87+
![Okta OIDC App2](../../images/self-hosted/dex-okta-oidc-app2.png)
88+
89+
- Now, finish the configuration on your Helm values file, it should look something like this:
90+
```yaml
91+
logfire-dex:
92+
...
93+
config:
94+
connectors:
95+
- type: oidc
96+
id: okta
97+
name: Okta
98+
config:
99+
issuer: <Issuer_URL> ### This is the URL from the Sign On tab
100+
clientID: <Client ID>
101+
clientSecret: <Client Secret Value>
102+
insecureSkipEmailVerified: true
68103
```

0 commit comments

Comments
 (0)