Skip to content

Commit 89356b8

Browse files
author
GitHub Actions
committed
Update the enabling authentication with rhbk
1 parent fa610c9 commit 89356b8

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

modules/authentication/proc-enabling-authentication-with-rhbk.adoc

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -39,11 +39,11 @@ Save the value for the next step:
3939
[source,yaml]
4040
----
4141
auth:
42-
environment: production # <1>
42+
environment: production
4343
providers:
4444
oidc:
4545
production:
46-
metadataUrl: ${AUTH_OIDC_METADATA_URL} # <2>
46+
metadataUrl: ${AUTH_OIDC_METADATA_URL}
4747
clientId: ${AUTH_OIDC_CLIENT_ID}
4848
clientSecret: ${AUTH_OIDC_CLIENT_SECRET}
4949
prompt: auto
@@ -73,10 +73,10 @@ Optional: Consider adding the following optional fields:
7373
+
7474
--
7575
To enable authentication without requiring to provision users in the {product-short} software catalog.
76-
+
76+
7777
WARNING: Use this option to explore {product-short} features, but do not use it in production.
78-
+
79-
.`{my-app-config-file}` fragment with optional field to allow authenticating users absent from the software catalog
78+
79+
`{my-app-config-file}` fragment with optional field to allow authenticating users absent from the software catalog
8080
[source,yaml]
8181
----
8282
auth:
@@ -151,14 +151,14 @@ After successful authentication, the user signing in must be resolved to an exis
151151
+
152152
The authentication provider tries each sign-in resolver in order until it succeeds, and fails if none succeed.
153153
+
154-
WARNING: In production mode, only configure one resolver to ensure users are securely matched.
154+
WARNING: In production mode, only configure one resolver to ensure users are securely matched.
155155
`resolver`::::
156156
Enter the sign-in resolver name.
157157
Available values:
158158
* `emailLocalPartMatchingUserEntityName`
159159
* `emailMatchingUserEntityProfileEmail`
160160
* `preferredUsernameMatchingUserEntityName`
161-
+
161+
162162
.`{my-app-config-file}` fragment with optional `resolvers` list
163163
[source,yaml]
164164
----
@@ -235,4 +235,4 @@ If multiple valid refresh tokens are issued due to frequent refresh token reques
235235
.Verification
236236
. Go to the {product-short} login page.
237237
. Your {product-short} sign-in page displays *Sign in using OIDC* and the Guest user sign-in is disabled.
238-
. Log in with OIDC by using the saved **Username** and **Password** values.
238+
. Log in with OIDC by using the saved **Username** and **Password** values.

0 commit comments

Comments
 (0)