@@ -39,11 +39,11 @@ Save the value for the next step:
3939[source,yaml]
4040----
4141auth:
42- environment: production # <1>
42+ environment: production
4343 providers:
4444 oidc:
4545 production:
46- metadataUrl: ${AUTH_OIDC_METADATA_URL} # <2>
46+ metadataUrl: ${AUTH_OIDC_METADATA_URL}
4747 clientId: ${AUTH_OIDC_CLIENT_ID}
4848 clientSecret: ${AUTH_OIDC_CLIENT_SECRET}
4949 prompt: auto
@@ -73,10 +73,10 @@ Optional: Consider adding the following optional fields:
7373+
7474--
7575To enable authentication without requiring to provision users in the {product-short} software catalog.
76- +
76+
7777WARNING: Use this option to explore {product-short} features, but do not use it in production.
78- +
79- . `{my-app-config-file}` fragment with optional field to allow authenticating users absent from the software catalog
78+
79+ `{my-app-config-file}` fragment with optional field to allow authenticating users absent from the software catalog
8080[source,yaml]
8181----
8282auth:
@@ -151,14 +151,14 @@ After successful authentication, the user signing in must be resolved to an exis
151151+
152152The authentication provider tries each sign-in resolver in order until it succeeds, and fails if none succeed.
153153+
154- WARNING: In production mode, only configure one resolver to ensure users are securely matched.
154+ WARNING: In production mode, only configure one resolver to ensure users are securely matched.
155155`resolver`::::
156156Enter the sign-in resolver name.
157157Available values:
158158* `emailLocalPartMatchingUserEntityName`
159159* `emailMatchingUserEntityProfileEmail`
160160* `preferredUsernameMatchingUserEntityName`
161- +
161+
162162.`{my-app-config-file}` fragment with optional `resolvers` list
163163[source,yaml]
164164----
@@ -235,4 +235,4 @@ If multiple valid refresh tokens are issued due to frequent refresh token reques
235235.Verification
236236. Go to the {product-short} login page.
237237. Your {product-short} sign-in page displays *Sign in using OIDC* and the Guest user sign-in is disabled.
238- . Log in with OIDC by using the saved **Username** and **Password** values.
238+ . Log in with OIDC by using the saved **Username** and **Password** values.
0 commit comments