Skip to content

Commit 3a664c4

Browse files
authored
Merge branch 'main' into remove-unused-auth-module
2 parents 8562ff6 + 95026dc commit 3a664c4

27 files changed

+58
-56
lines changed

artifacts/attributes.adoc

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@
3131
:ocp-version: 4.15
3232
// First mention of OpenShift CLI or `oc` in a module
3333
:openshift-cli: pass:quotes[OpenShift CLI (`oc`)]
34+
:rhsso-brand-name: Red Hat Single-Sign On
35+
:rhsso: RHSSO
3436

3537
// Partner Platforms
3638
:aws-brand-name: Amazon Web Services
@@ -84,20 +86,20 @@
8486
:authorization-book-url: https://docs.redhat.com/documentation/en-us/red_hat_developer_hub/{product-version}/html-single/authorization/index
8587
:authorization-book-title: Authorization
8688

87-
:installing-on-ocp-book-url: https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html/installing_red_hat_developer_hub_on_openshift_container_platform/index
89+
:installing-on-ocp-book-url: https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/installing_red_hat_developer_hub_on_openshift_container_platform/index
8890
:installing-on-ocp-book-title: Installing {product} on {ocp-short}
8991

90-
:installing-on-eks-book-url: https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html/installing_red_hat_developer_hub_on_amazon_elastic_kubernetes_service/index
92+
:installing-on-eks-book-url: https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/installing_red_hat_developer_hub_on_amazon_elastic_kubernetes_service/index
9193
:installing-on-eks-book-title: Installing {product} on {eks-brand-name}
9294

93-
:installing-on-aks-book-url: https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html/installing_red_hat_developer_hub_on_microsoft_azure_kubernetes_service/index
95+
:installing-on-aks-book-url: https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/installing_red_hat_developer_hub_on_microsoft_azure_kubernetes_service/index
9496
:installing-on-aks-book-title: Installing {product} on {aks-brand-name}
9597

96-
:installing-in-air-gap-book-url: https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html/installing_red_hat_developer_hub_in_an_air-gapped_environment/index
98+
:installing-in-air-gap-book-url: https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/installing_red_hat_developer_hub_in_an_air-gapped_environment/index
9799
:installing-in-air-gap-book-title: Installing {product} in an air-gapped environment
98100

99-
:upgrading-book-url: https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html/upgrading_red_hat_developer_hub/index
101+
:upgrading-book-url: https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/upgrading_red_hat_developer_hub/index
100102
:upgrading-book-title: Upgrading {product}
101103

102-
:plugins-configure-book-url: https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html/configuring_dynamic_plugins/index
103-
:plugins-configure-book-title: Configuring dynamic plugins
104+
:plugins-configure-book-url: https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/configuring_dynamic_plugins/index
105+
:plugins-configure-book-title: Configuring dynamic plugins
Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,56 +1,56 @@
11
[id='configuring-authorization-in-rhdh']
22
= Configuring authorization in {product}
33

4-
include::modules/admin/con-rbac-overview.adoc[leveloffset=+1]
4+
include::modules/authorization/con-rbac-overview.adoc[leveloffset=+1]
55

66

7-
include::modules/admin/ref-rbac-permission-policies.adoc[leveloffset=+1]
7+
include::modules/authorization/ref-rbac-permission-policies.adoc[leveloffset=+1]
88

99

10-
include::modules/admin/con-rbac-config-permission-policies.adoc[leveloffset=+2]
10+
include::modules/authorization/con-rbac-config-permission-policies.adoc[leveloffset=+2]
1111

1212

13-
include::modules/admin/con-rbac-config-permission-policies-admin.adoc[leveloffset=+3]
13+
include::modules/authorization/con-rbac-config-permission-policies-admin.adoc[leveloffset=+3]
1414

1515

16-
include::modules/admin/con-rbac-config-permission-policies-external-file.adoc[leveloffset=+3]
16+
include::modules/authorization/con-rbac-config-permission-policies-external-file.adoc[leveloffset=+3]
1717

18-
include::modules/admin/proc-mounting-the-policy-csv-file-using-the-operator.adoc[leveloffset=+4]
18+
include::modules/authorization/proc-mounting-the-policy-csv-file-using-the-operator.adoc[leveloffset=+4]
1919

20-
include::modules/admin/proc-mounting-the-policy-csv-file-using-helm.adoc[leveloffset=+4]
20+
include::modules/authorization/proc-mounting-the-policy-csv-file-using-helm.adoc[leveloffset=+4]
2121

2222

23-
include::modules/admin/con-rbac-conditional-policies-rhdh.adoc[leveloffset=+1]
23+
include::modules/authorization/con-rbac-conditional-policies-rhdh.adoc[leveloffset=+1]
2424

2525

26-
include::modules/admin/ref-rbac-conditional-policy-definition.adoc[leveloffset=+2]
26+
include::modules/authorization/ref-rbac-conditional-policy-definition.adoc[leveloffset=+2]
2727

2828

29-
include::modules/admin/proc-rbac-config-conditional-policy-file.adoc[leveloffset=+2]
29+
include::modules/authorization/proc-rbac-config-conditional-policy-file.adoc[leveloffset=+2]
3030

3131

32-
include::modules/admin/proc-rbac-ui-manage-roles.adoc[leveloffset=+1]
32+
include::modules/authorization/proc-rbac-ui-manage-roles.adoc[leveloffset=+1]
3333

3434

35-
include::modules/admin/proc-rbac-ui-create-role.adoc[leveloffset=+2]
35+
include::modules/authorization/proc-rbac-ui-create-role.adoc[leveloffset=+2]
3636

3737

38-
include::modules/admin/proc-rbac-ui-edit-role.adoc[leveloffset=+2]
38+
include::modules/authorization/proc-rbac-ui-edit-role.adoc[leveloffset=+2]
3939

4040

41-
include::modules/admin/proc-rbac-ui-delete-role.adoc[leveloffset=+2]
41+
include::modules/authorization/proc-rbac-ui-delete-role.adoc[leveloffset=+2]
4242

4343

44-
include::modules/admin/con-user-stats-rhdh.adoc[leveloffset=+1]
44+
include::modules/authorization/con-user-stats-rhdh.adoc[leveloffset=+1]
4545

4646

47-
include::modules/admin/proc-download-user-stats-rhdh.adoc[leveloffset=+2]
47+
include::modules/authorization/proc-download-user-stats-rhdh.adoc[leveloffset=+2]
4848

4949

50-
include::modules/admin/con-rbac-rest-api.adoc[leveloffset=+1]
50+
include::modules/authorization/con-rbac-rest-api.adoc[leveloffset=+1]
5151

5252

53-
include::modules/admin/proc-rbac-send-request-rbac-rest-api.adoc[leveloffset=+2]
53+
include::modules/authorization/proc-rbac-send-request-rbac-rest-api.adoc[leveloffset=+2]
5454

5555

56-
include::modules/admin/ref-rbac-rest-api-endpoints.adoc[leveloffset=+2]
56+
include::modules/authorization/ref-rbac-rest-api-endpoints.adoc[leveloffset=+2]

modules/admin/proc-using-azure-auth-provider.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ The `core-plugin-api` package in {product-short} comes integrated with Microsoft
77
.Prerequisites
88
* You have deployed {product-short} on AKS.
99

10-
For more information, see xref:{installing-on-aks-book-url}#assembly-install-rhdh-aks[Installing Red Hat Developer Hub on Azure Kubernetes Service (AKS)].
10+
For more information, see xref:{installing-on-aks-book-url}#assembly-install-rhdh-aks[Installing {product} on {aks-name} ({aks-short})].
1111

1212
* You have created registered your application in Azure portal. For more information, see https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app[Register an application with the Microsoft identity platform].
1313

modules/authentication/proc-creating-a-custom-transformer-to-provision-users-from-rhsso-to-the-software-catalog.adoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
1-
[id="provisioning-users-from-rhsso-to-the-software-catalog"]
2-
= Creating a custom transformer to provision users from Red Hat Single-Sign On (RHSSO) to the software catalog
1+
[id="creating-a-custom-transformer-to-provision-users-from-rhsso-to-the-software-catalog"]
2+
= Creating a custom transformer to provision users from {rhsso-brand-name} ({rhsso}) to the software catalog
33

4-
To customize how RHSSO users and groups are mapped to {product} entities, you can create a backend module that uses the `keycloakTransformerExtensionPoint` to provide custom user and group transformers for the Keycloak backend.
4+
To customize how {rhsso} users and groups are mapped to {product} entities, you can create a backend module that uses the `keycloakTransformerExtensionPoint` to provide custom user and group transformers for the Keycloak backend.
55

66
.Prerequisites
7-
* You have xref:provisioning-users-from-rhsso-to-the-software-catalog[enabled provisioning users from Red Hat Single-Sign On (RHSSO) to the software catalog].
7+
* You have xref:provisioning-users-from-rhsso-to-the-software-catalog[enabled provisioning users from {rhsso-brand-name} ({rhsso}) to the software catalog].
88

99
.Procedure
1010
. Create a new backend module with the `yarn new` command.
@@ -85,8 +85,8 @@ Check the console logs to verify that the synchronization is completed.
8585

8686
* After the first import is complete, navigate to the *Catalog* page and select **User** to view the list of users.
8787

88-
* When you select a user, you see the information imported from RHSSO.
88+
* When you select a user, you see the information imported from {rhsso}.
8989

90-
* You can select a group, view the list, and access or review the information imported from RHSSO.
90+
* You can select a group, view the list, and access or review the information imported from {rhsso}.
9191

92-
* You can log in with an RHSSO account.
92+
* You can log in with an {rhsso} account.

modules/authentication/proc-enabling-authentication-with-rhsso.adoc

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,21 @@
11
[id="enabling-authentication-with-rhsso"]
2-
= Enabling authentication with Red Hat Single-Sign On (RHSSO)
2+
= Enabling authentication with {rhsso-brand-name} ({rhsso})
33

4-
To authenticate users with Red Hat Single Sign-On (RHSSO), enable the OpenID Connect (OIDC) authentication provider in {product}.
4+
To authenticate users with Red Hat Single Sign-On ({rhsso}), enable the OpenID Connect (OIDC) authentication provider in {product}.
55

66

77
.Prerequisites
88
* You link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html/administration_guide_for_red_hat_developer_hub/assembly-add-custom-app-file-openshift_admin-rhdh[added a custom {product-short} application configuration], and have sufficient permissions to modify it.
9-
* You have sufficient permissions in RHSSO to create and manage a realm.
9+
* You have sufficient permissions in {rhsso} to create and manage a realm.
1010

1111
.Procedure
12-
. To allow {product-short} to authenticate with RHSSO, complete the steps in RHSSO, to link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#realms-apps_[create a realm and a user] and link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#registering-app_[register the {product-short} application]:
12+
. To allow {product-short} to authenticate with {rhsso}, complete the steps in {rhsso}, to link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#realms-apps_[create a realm and a user] and link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#registering-app_[register the {product-short} application]:
1313

1414
.. Use an existing realm, or link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#create-realm_[create a realm], with a distinctive **Name** such as __<my_realm>__.
1515
Save the value for the next step:
16-
* **RHSSO realm base URL**, such as: __<your_rhsso_URL>__/auth/realms/__<your_realm>__.
16+
* **{rhsso} realm base URL**, such as: __<your_rhsso_URL>__/auth/realms/__<your_realm>__.
1717

18-
.. To register your {product-short} in RHSSO, in the created realm, link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#registering-app_[create a Client ID], with:
18+
.. To register your {product-short} in {rhsso}, in the created realm, link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#registering-app_[create a Client ID], with:
1919
... **Client ID**: A distinctive client ID, such as __<{product-very-short}>__.
2020
... **Valid redirect URIs**: Set to the OIDC handler URL: `https://__<RHDH_URL>__/api/auth/oidc/handler/frame`.
2121
... Navigate to the **Credentials** tab and copy the **Client secret**.
@@ -25,16 +25,16 @@ Save the value for the next step:
2525

2626
.. To prepare for the verification steps, in the same realm, get the credential information for an existing user or link:https://docs.redhat.com/en/documentation/red_hat_single_sign-on/7.6/html-single/getting_started_guide/index#create-user_[create a user]. Save the user credential information for the verification steps.
2727

28-
. To add your RHSSO credentials to your {product-short} secrets, edit your {product-short} secrets, such as `secrets-rhdh`, and add the following key/value pairs:
28+
. To add your {rhsso} credentials to your {product-short} secrets, edit your {product-short} secrets, such as `secrets-rhdh`, and add the following key/value pairs:
2929
+
3030
`AUTH_OIDC_CLIENT_ID`:: Enter the saved **Client ID**.
3131
`AUTH_OIDC_CLIENT_SECRET`:: Enter the saved **Client Secret**.
32-
`AUTH_OIDC_METADATA_URL`:: Enter the saved **RHSSO realm base URL**.
32+
`AUTH_OIDC_METADATA_URL`:: Enter the saved **{rhsso} realm base URL**.
3333

34-
. To set up the RHSSO authentication provider in your {product-short} custom configuration, edit your custom {product-short} ConfigMap such as `app-config-rhdh`, and add the following lines to the `app-config-rhdh.yaml` content:
34+
. To set up the {rhsso} authentication provider in your {product-short} custom configuration, edit your custom {product-short} ConfigMap such as `app-config-rhdh`, and add the following lines to the `app-config-rhdh.yaml` content:
3535
+
3636
--
37-
.`app-config-rhdh.yaml` fragment with mandatory fields to enable authentication with RHSSO
37+
.`app-config-rhdh.yaml` fragment with mandatory fields to enable authentication with {rhsso}
3838
[source,yaml]
3939
----
4040
auth:
@@ -85,7 +85,7 @@ dangerouslyAllowSignInWithoutUserInCatalog: true
8585

8686
`callbackUrl`::
8787
--
88-
RHSSO callback URL.
88+
{rhsso} callback URL.
8989

9090
.`app-config-rhdh.yaml` fragment with optional `callbackURL` field
9191
[source,yaml]
@@ -130,7 +130,7 @@ auth:
130130

131131
`scope`::
132132
--
133-
RHSSO scope.
133+
{rhsso} scope.
134134

135135
.`app-config-rhdh.yaml` fragment with optional `scope` field
136136
[source,yaml]

modules/authentication/proc-provisioning-users-from-rhsso-to-the-software-catalog.adoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
[id="provisioning-users-from-rhsso-to-the-software-catalog"]
2-
= Provisioning users from Red Hat Single-Sign On (RHSSO) to the software catalog
2+
= Provisioning users from {rhsso-brand-name} ({rhsso}) to the software catalog
33

44
.Prerequisites
5-
* You xref:enabling-authentication-with-rhsso[enabled authentication with RHSSO].
5+
* You xref:enabling-authentication-with-rhsso[enabled authentication with {rhsso}].
66

77
.Procedure
88

9-
* To enable RHSSO member discovery, edit your custom {product-short} ConfigMap, such as `app-config-rhdh`, and add the following lines to the `app-config-rhdh.yaml` content:
9+
* To enable {rhsso} member discovery, edit your custom {product-short} ConfigMap, such as `app-config-rhdh`, and add the following lines to the `app-config-rhdh.yaml` content:
1010
+
1111
--
1212
[id=keycloakOrgProviderId]
@@ -27,13 +27,13 @@ catalog:
2727
Allow authentication only for users present in the {product-short} software catalog.
2828

2929
`baseUrl`::
30-
Your RHSSO server URL, defined when xref:enabling-authentication-with-rhsso[enabling authentication with RHSSO].
30+
Your {rhsso} server URL, defined when xref:enabling-authentication-with-rhsso[enabling authentication with {rhsso}].
3131

3232
`clientId`::
33-
Your {product-short} application client ID in RHSSO, defined when xref:enabling-authentication-with-rhsso[enabling authentication with RHSSO].
33+
Your {product-short} application client ID in {rhsso}, defined when xref:enabling-authentication-with-rhsso[enabling authentication with {rhsso}].
3434

3535
`clientSecret`::
36-
Your {product-short} application client secret in RHSSO, defined when xref:enabling-authentication-with-rhsso[enabling authentication with RHSSO].
36+
Your {product-short} application client secret in {rhsso}, defined when xref:enabling-authentication-with-rhsso[enabling authentication with {rhsso}].
3737

3838
Optional: Consider adding the following optional fields:
3939

@@ -150,4 +150,4 @@ catalog:
150150
{"class":"KeycloakOrgEntityProvider","level":"info","message":"Committed 3 Keycloak users and 2 Keycloak groups in 0.0 seconds.","plugin":"catalog","service":"backstage","taskId":"KeycloakOrgEntityProvider:default:refresh","taskInstanceId":"bf0467ff-8ac4-4702-911c-380270e44dea","timestamp":"2024-09-25 13:58:04"}
151151
----
152152

153-
. Log in with an RHSSO account.
153+
. Log in with an {rhsso} account.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.

0 commit comments

Comments
 (0)