generated from redhat-developer/new-project-template
-
Notifications
You must be signed in to change notification settings - Fork 58
RHIDP-5489 Enabling authentication with your authentication provider #891
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Closed
Closed
Changes from all commits
Commits
Show all changes
6 commits
Select commit
Hold shift + click to select a range
ad2a49f
RHIDP-5489 Enabling authentication with your custom authentication pr…
themr0c d3675ad
Merge branch 'main' into RHIDP-5489
themr0c 8a47329
Update modules/authentication/proc-enabling-authentication-with-your-…
themr0c ca8b0dd
Merge branch 'main' into RHIDP-5489
themr0c 5001ccf
docs: removed ldap example, and added content from https://github.com…
themr0c 62c40bc
language fixes
themr0c File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
74 changes: 74 additions & 0 deletions
74
...tion/proc-enabling-authentication-with-your-custom-authentication-provider.adoc
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,74 @@ | ||
| [id="enabling-authentication-with-your-custom-authentication-provider"] | ||
| = Enabling authentication with your custom authentication provider | ||
|
|
||
| By default, {product} supports all the documented authentication providers, such as GitHub or Microsoft Azure. | ||
| However, you can extend {product-short} with your custom authentication provider by using dynamic plugins that either adds more configuration options for an existing provider, or adds a new authentication provider altogether. | ||
|
|
||
| .Prerequisites | ||
| * You link:{configuring-book-url}[added a custom {product-short} application configuration], and have enough permissions to change it. | ||
| * link:{installing-and-viewing-dynamic-plugins-url}#assembly-third-party-plugins[Exporting, packaging, and installing third-party plugins] knowledge. | ||
| * You collected the relevant information to connect to your custom authentication provider. | ||
|
|
||
| .Procedure | ||
| . Create your custom authentication provider backend plugin, which: | ||
| * Provides an authentication provider API. | ||
| * Bridges authentication to your custom authentication provider. | ||
| * Includes an example backend configuration in an `app-config.yaml`file. | ||
|
|
||
| . Create your custom authentication provider front-end plugin, which: | ||
| * Provides a custom `SignInPage` component. | ||
| The `SignInPage` component is the place in a {product-short} app where the front-end API reference connects to the appropriate backend authentication provider API service. | ||
| * Provides an API client for the backend authentication provider service. | ||
| * Includes an example backend configuration in an `app-config.yaml`file. | ||
|
|
||
| . link:{installing-and-viewing-dynamic-plugins-url}#assembly-third-party-plugins[Export, package, and install your custom plugins]. | ||
| . Add your custom plugins configuration to your `dynamic-plugins.yaml` file. | ||
|
|
||
| . {product-short} users expect to see all authentication providers listed in the *User settings* section, *Authentication Providers* tab. | ||
| To add entries for an authentication provider from a dynamic plugin, use the `providerSettings` configuration in your `{my-app-config-file}` file: | ||
| + | ||
| [source,yaml,subs="+quotes"] | ||
| ---- | ||
| dynamicPlugins: | ||
| frontend: | ||
| _<package_name>_: | ||
| providerSettings: | ||
| - title: _<My Custom Auth Provider>_ | ||
| description: _<Sign in using My Custom Auth Provider>_ | ||
| provider: _<core.auth.my-custom-auth-provider>_ | ||
| ---- | ||
| + | ||
| Each provider settings entry should define the following attributes: | ||
|
|
||
| `title`:: The title for the authentication provider shown next to the user profile image if available. | ||
|
|
||
| `description`:: The short description of the authentication provider, which {product-short} displays on the login page. | ||
|
|
||
| `provider`:: The authentication provider ID as provided to the `createApiRef` API call, which is using this value to look up the corresponding API factory for the authentication provider to connect to the provider's Sign In and Sign Out button. | ||
|
|
||
| . Use a custom `SignInPage` component. | ||
| {product-short} is using the `SignInPage` component to connect one or more authentication providers to the application sign-in process. | ||
| By default, {product-short} has a static `SignInPage` that supports all the built-in authentication providers. | ||
| To use a different authentication provider, for example from a dynamic plugin use the `signInPage` configuration in your `{my-app-config-file}` file: | ||
| + | ||
| [source,yaml,subs="+quotes"] | ||
| ---- | ||
| dynamicPlugins: | ||
| frontend: | ||
| _<package_name>_: | ||
| signInPage: | ||
| importName: CustomSignInPage | ||
| ---- | ||
| + | ||
| Only one `signInPage` is specified and used by the application, this configuration object supports the following properties: | ||
|
|
||
| `importName`:: Required setting that should resolve to a component that returns a configured `SignInPage` component that connects the appropriate authentication provider factories, or a compatible custom implementation. | ||
|
|
||
| `module`:: Optional setting to specify which set of assets the dynamic plugin might access. | ||
| The default value is `PluginRoot`. | ||
|
|
||
| .Verification | ||
| . Go to the {product-short} login page. | ||
| . Your {product-short} sign-in page displays *_<Sign in using My Custom Auth Provider>_* and the Guest user sign-in is disabled. | ||
| . Log in with your custom authentication provider. | ||
|
|
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.