Skip to content

Commit cee1be2

Browse files
committed
applied suggestions
Signed-off-by: Fabrice Flore-Thébault <[email protected]>
1 parent 00487a2 commit cee1be2

7 files changed

+58
-68
lines changed

modules/authentication/proc-authenticationg-with-the-guest-user-on-an-operator-based-installation.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ After an Operator-based installation, you can configure {product-short} to log i
66

77
.Prerequisites
88
* You link:[installed {product-short} by using the Operator].
9-
* You link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/administration_guide_for_red_hat_developer_hub/index#proc-add-custom-app-config-file-ocp-operator_admin-rhdh[added a custom {product-short} application configuration], and have sufficient permissions to modify it.
9+
* You link:{configuring-book-url}[added a custom {product-short} application configuration], and have sufficient permissions to modify it.
1010
1111
.Procedure
1212
* To enable the guest user in your {product-short} custom configuration, link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/administration_guide_for_red_hat_developer_hub/index#proc-add-custom-app-config-file-ocp-operator_admin-rhdh[edit your {product-short} application configuration] with following content:

modules/authentication/proc-enabling-authentication-with-github.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
To authenticate users with GitHub, enable the GitHub authentication provider in {product}.
55

66
.Prerequisites
7-
* You have link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html/administration_guide_for_red_hat_developer_hub/assembly-add-custom-app-file-openshift_admin-rhdh[added a custom {product-short} application configuration], and have sufficient permissions to modify it.
7+
* You link:{configuring-book-url}[added a custom {product-short} application configuration], and have sufficient permissions to modify it.
88
* You have sufficient permissions in GitHub to create and manage a link:https://docs.github.com/en/apps/overview[GitHub App].
99

1010
.Procedure

modules/authentication/proc-enabling-authentication-with-microsoft-azure.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55

66
.Prerequisites
77
. You have the permission to register an application in Microsoft Azure.
8-
. You link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/administration_guide_for_red_hat_developer_hub/index#assembly-add-custom-app-file-openshift_admin-rhdh[added a custom {product-short} application configuration].
8+
* You link:{configuring-book-url}[added a custom {product-short} application configuration], and have sufficient permissions to modify it.
99

1010
.Procedure
1111
. To allow {product-short} to authenticate with Microsoft Azure, link:https://learn.microsoft.com/en-us/entra/identity-platform/scenario-web-app-sign-user-app-registration?tabs=aspnetcore#register-an-app-by-using-the-azure-portal[create an OAuth application in Microsoft Azure].

modules/authentication/proc-enabling-authentication-with-rhbk.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ To authenticate users with {rhbk-brand-name} ({rhbk}), enable the OpenID Connect
55

66

77
.Prerequisites
8-
* You link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html/administration_guide_for_red_hat_developer_hub/assembly-add-custom-app-file-openshift_admin-rhdh[added a custom {product-short} application configuration], and have sufficient permissions to modify it.
9-
* You have sufficient permissions in {rhbk} to create and manage a realm.
8+
* You link:{configuring-book-url}[added a custom {product-short} application configuration], and have sufficient permissions to modify it.
9+
* You have sufficient permissions in {rhsso} to create and manage a realm.
1010

1111
.Procedure
1212
. To allow {product-short} to authenticate with {rhbk}, complete the steps in {rhbk}, to link:https://docs.redhat.com/en/documentation/red_hat_build_of_keycloak/24.0/html/getting_started_guide/getting-started-zip-#getting-started-zip-create-a-realm[create a realm and a user] and link:https://docs.redhat.com/en/documentation/red_hat_build_of_keycloak/24.0/html/getting_started_guide/getting-started-zip-#getting-started-zip-secure-the-first-application[secure the first application]:

modules/configuring/proc-provisioning-your-custom-configuration.adoc

Lines changed: 8 additions & 63 deletions
Original file line numberDiff line numberDiff line change
@@ -15,75 +15,20 @@ Your changes on this configuration might get reverted on {product-short} restart
1515
.Procedure
1616
. Author your custom `{my-product-secrets}.txt` file to provision your secrets as environment variables values in an {ocp-short} secret, rather than in clear text in your configuration files.
1717
It contains one secret per line in `KEY=value` form.
18-
19-
.. To define the {product-short} backend secret, add the `BACKEND_SECRET` environment variable with a base64 encoded string.
20-
Use a unique value for each {product-short} instance.
21-
+
22-
[source,terminal,subs="+attributes"]
23-
----
24-
$ echo > {my-product-secrets}.txt "BACKEND_SECRET=$(node -p 'require("crypto").randomBytes(24).toString("base64")')"
25-
----
2618
+
27-
.`{my-product-secrets}.txt` example
28-
====
29-
----
30-
BACKEND_SECRET=3E2/rIPuZNFCtYHoxVP8wjriffnN1q/z
31-
----
32-
====
33-
34-
.. link:{authentication-book-url}[Add your authentication secrets].
19+
* link:{authentication-book-url}[Enter your authentication secrets].
3520

3621
. Author your custom `{my-app-config-file}` file.
3722
This is the main {product-short} configuration file.
3823
+
39-
.Minimal `{my-app-config-file}` example
40-
====
41-
[source,yaml,subs="+attributes,+quotes"]
42-
----
43-
backend:
44-
auth:
45-
externalAccess:
46-
- type: legacy
47-
options:
48-
subject: legacy-default-config
49-
secret: "${BACKEND_SECRET}"
50-
----
51-
====
52-
53-
Mandatory fields::
54-
55-
`backend.auth.externalAccess`:::
56-
Enter the mandatory backend authentication key configuration.
57-
58-
Optional fields::
59-
60-
`app.title`:::
61-
Optionally, enter your {product-short} instance display name, such as _<{product}>_.
62-
See link:{customizing-book-url}#customizing-your-product-title[Customizing your {product-short} title].
63-
64-
`app.baseURL`, `backend.baseURL` and `backend.cors.origin`:::
65-
Optionally, enter your {product-short} external URL, such as pass:c,a,q[{my-product-url}].
66-
See link:{customizing-book-url}#customizing-your-product-base-url[Customizing your {product-short} base URL].
67-
68-
`app.branding`:::
69-
Optionally, enter your appearance customization configuration.
70-
See link:{customizing-book-url}#customizing-appearance[Customizing the appearance].
71-
72-
`backend.auth`:::
73-
Optionally, enter your authentication configuration.
74-
See link:{authentication-book-url}[{authentication-book-title}].
75-
76-
`catalog`:::
77-
Optionally, configure the {product-short} catalog.
78-
See link:{authentication-book-url}[{authorization-book-title}] and xref:proc-configuring-an-rhdh-instance-with-tls-in-kubernetes_running-behind-a-proxy[].
79-
80-
`kubernetes`:::
81-
Optionally, configure the {ocp-short} integration.
82-
See xref:proc-configuring-an-rhdh-instance-with-tls-in-kubernetes_running-behind-a-proxy[].
24+
You can start with an empty file to use the default configuration.
25+
+
26+
Optionally, enter your configuration such as:
8327

84-
`permission`:::
85-
Optionally, configure authorization.
86-
See link:{authorization-book-url}[{authorization-book-title}].
28+
* link:{authentication-book-url}[{authentication-book-title}].
29+
* link:{authorization-book-url}[{authorization-book-title}].
30+
* link:{customizing-book-url}[Customization].
31+
* xref:proc-configuring-an-rhdh-instance-with-tls-in-kubernetes_running-behind-a-proxy[Configure your {ocp-short} integration].
8732

8833
. Provision your custom configuration files to your {ocp-short} cluster.
8934

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
[id='customizing-the-backend-secret']
2+
= Customizing {product} backend secret
3+
4+
The default {product} configuration defines the {product-short} backend secret for service to service authentication.
5+
6+
You can define your custom {product-short} backend secret.
7+
8+
.Prerequisites
9+
* You link:{configuring-book-url}[added a custom {product-short} application configuration], and have sufficient permissions to modify it.
10+
11+
.Procedure
12+
13+
. To define the {product-short} backend secret,
14+
add to your custom `{my-product-secrets}.txt` file the `BACKEND_SECRET` environment variable with a base64 encoded string.
15+
Use a unique value for each {product-short} instance.
16+
+
17+
[source,terminal,subs="+attributes"]
18+
----
19+
$ echo > {my-product-secrets}.txt "BACKEND_SECRET=$(node -p 'require("crypto").randomBytes(24).toString("base64")')"
20+
----
21+
+
22+
.`{my-product-secrets}.txt` example
23+
----
24+
BACKEND_SECRET=3E2/rIPuZNFCtYHoxVP8wjriffnN1q/z
25+
----
26+
27+
. Add your backend secret to your custom `{my-app-config-file}` file.
28+
+
29+
.`{my-app-config-file}` excerpt defining the backend secret
30+
[source,yaml,subs="+attributes,+quotes"]
31+
----
32+
backend:
33+
auth:
34+
externalAccess:
35+
- type: legacy
36+
options:
37+
subject: legacy-default-config
38+
secret: "${BACKEND_SECRET}"
39+
----
40+

titles/customizing/master.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,13 @@ include::artifacts/attributes.adoc[]
1010

1111
include::modules/customizing/proc-customizing-your-product-title.adoc[leveloffset=+1]
1212

13+
1314
include::modules/customizing/proc-customizing-your-product-base-url.adoc[leveloffset=+1]
1415

16+
17+
include::modules/customizing/proc-customizing-the-backend-secret.adoc[leveloffest=+1]
18+
19+
1520
include::assemblies/assembly-configuring-templates.adoc[leveloffset=+1]
1621

1722

0 commit comments

Comments
 (0)