You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
= Configuring a floating action button in {product}
5
+
6
+
You can use the floating action button plugin to configure any action button as a floating button in any page in the {product-short} instance as you want. The floating action button plugin is disabled by default. You can also configure floating action buttons to display as submenu options within the main floating action button by assigning the floating action buttons to the same slot.
Copy file name to clipboardExpand all lines: modules/authentication/proc-enabling-authentication-with-github.adoc
+57-45Lines changed: 57 additions & 45 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,17 +64,17 @@ TIP: If you plan to make changes using the GitHub API, ensure that `Read and wri
64
64
`GITHUB_WEBHOOK_SECRET`:: Enter the saved *Webhook secret*.
65
65
66
66
. To set up the GitHub authentication provider and enable integration with the GitHub API in your {product-short} custom configuration, edit your custom {product-short} ConfigMap such as `app-config-rhdh`, and add the following lines to the `app-config-rhdh.yaml` content:
67
+
.. Configure mandatory fields:
67
68
+
68
-
--
69
69
.`app-config-rhdh.yaml` fragment with mandatory fields to enable authentication with GitHub
70
70
[source,yaml]
71
71
----
72
72
auth:
73
-
environment: production
73
+
environment: production # <1>
74
74
providers:
75
75
github:
76
76
production:
77
-
clientId: ${AUTH_GITHUB_CLIENT_ID}
77
+
clientId: ${AUTH_GITHUB_CLIENT_ID} # <2>
78
78
clientSecret: ${AUTH_GITHUB_CLIENT_SECRET}
79
79
integrations:
80
80
github:
@@ -87,26 +87,65 @@ integrations:
87
87
webhookSecret: ${GITHUB_WEBHOOK_SECRET}
88
88
privateKey: |
89
89
${GITHUB_PRIVATE_KEY_FILE}
90
-
signInPage: github
90
+
signInPage: github # <3>
91
91
----
92
+
<1> Mark the environment as `production` and disable the Guest login option in the {product-short} login page.
93
+
<2> Apply the GitHub credentials configured in your {product-short} secrets.
94
+
<3> To enable the GitHub provider as your {product-short} sign-in provider.
92
95
93
-
`environment: production`::
94
-
Mark the environment as `production` to hide the Guest login in the {product-short} home page.
96
+
.. Optional: Consider adding the following optional fields:
To enable authentication without requiring to provision users in the {product-short} software catalog.
128
+
`resolvers`:::
129
+
After successful authentication, the user signing in must be resolved to an existing user in the {product-short} catalog. To best match users securely for your use case, consider configuring a specific resolver. Enter the resolver list to override the default resolver: `usernameMatchingUserEntityName`.
130
+
+
131
+
The authentication provider tries each sign-in resolver in order until it succeeds, and fails if none succeed.
132
+
+
133
+
WARNING: In production mode, only configure one resolver to ensure users are securely matched.
To enable authentication without requiring to provision users in the {product-short} software catalog.
84
-
+
85
-
WARNING: Use `dangerouslyAllowSignInWithoutUserInCatalog` to explore {product-short} features, but do not use it in production.
86
-
+
87
-
.`app-config-rhdh.yaml` fragment with optional field to allow authenticating users absent from the software catalog
88
-
[source,yaml]
89
-
----
90
-
auth:
91
-
environment: production
92
-
providers:
93
-
microsoft:
94
-
production:
95
-
clientId: ${AUTH_AZURE_CLIENT_ID}
96
-
clientSecret: ${AUTH_AZURE_CLIENT_SECRET}
97
-
tenantId: ${AUTH_AZURE_TENANT_ID}
98
-
signInPage: microsoft
99
-
dangerouslyAllowSignInWithoutUserInCatalog: true
100
-
----
73
+
.. Optional: Consider adding following optional fields:
101
74
102
75
`domainHint`::
103
76
Optional for single-tenant applications.
@@ -133,7 +106,59 @@ auth:
133
106
additionalScopes:
134
107
- Mail.Send
135
108
----
136
-
--
109
+
`sessionDuration`::
110
+
Lifespan of the user session.
111
+
Enter a duration in `ms` library format (such as '24h', '2 days'), ISO duration, or "human duration" as used in code.
112
+
+
113
+
.`app-config-rhdh.yaml` fragment with optional `sessionDuration` field
114
+
[source,yaml,subs="+quotes"]
115
+
----
116
+
auth:
117
+
providers:
118
+
microsoft:
119
+
production:
120
+
sessionDuration: { hours: 24 }
121
+
----
122
+
123
+
`signIn` ::
124
+
125
+
`resolvers`:::
126
+
After successful authentication, the user signing in must be resolved to an existing user in the {product-short} catalog. To best match users securely for your use case, consider configuring a specific resolver. Enter the resolver list to override the default resolver: `emailLocalPartMatchingUserEntityName`.
127
+
+
128
+
The authentication provider tries each sign-in resolver in order until it succeeds, and fails if none succeed.
129
+
+
130
+
WARNING: In production mode, only configure one resolver to ensure users are securely matched.
0 commit comments