Move mod-auth-openidc.adoc to guides

Closes #31697

Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com>
This commit is contained in:
Giuseppe Graziano 2024-07-30 11:45:27 +02:00 committed by Marek Posolda
parent 11b19bc272
commit e1266c2678
2 changed files with 16 additions and 12 deletions

View file

@ -10,10 +10,6 @@ include::topics/oidc/oidc-overview.adoc[]
include::topics/oidc/javascript-adapter.adoc[] include::topics/oidc/javascript-adapter.adoc[]
ifeval::[{project_community}==true]
include::topics/oidc/mod-auth-openidc.adoc[]
endif::[]
include::topics/saml/saml-overview.adoc[] include::topics/saml/saml-overview.adoc[]
ifeval::[{project_product}==true] ifeval::[{project_product}==true]
include::topics/saml/java/java-adapters-product.adoc[] include::topics/saml/java/java-adapters-product.adoc[]

View file

@ -1,5 +1,11 @@
[[_mod_auth_openidc]] <#import "/templates/guide.adoc" as tmpl>
=== mod_auth_openidc Apache HTTPD Module <#import "/templates/links.adoc" as links>
<@tmpl.guide
title="mod_auth_openidc Apache HTTPD Module"
priority=40
summary="Configuring the mod_auth_openidc Apache module with {project_name}">
WARNING: {project_name} does not provide any official support to mod_auth_openidc. The instructions below are best-effort and may not be up-to-date. WARNING: {project_name} does not provide any official support to mod_auth_openidc. The instructions below are best-effort and may not be up-to-date.
We recommend that you stick to official mod_auth_openidc documentation for more details. We recommend that you stick to official mod_auth_openidc documentation for more details.
@ -22,7 +28,7 @@ An example configuration would look like the following.
---- ----
LoadModule auth_openidc_module modules/mod_auth_openidc.so LoadModule auth_openidc_module modules/mod_auth_openidc.so
ServerName ${HOSTIP} ServerName ${r"${HOSTIP}"}
<VirtualHost *:80> <VirtualHost *:80>
@ -32,16 +38,16 @@ ServerName ${HOSTIP}
#this is required by mod_auth_openidc #this is required by mod_auth_openidc
OIDCCryptoPassphrase a-random-secret-used-by-apache-oidc-and-balancer OIDCCryptoPassphrase a-random-secret-used-by-apache-oidc-and-balancer
OIDCProviderMetadataURL ${KC_ADDR}{kc_realms_path}/${KC_REALM}/.well-known/openid-configuration OIDCProviderMetadataURL ${r"${KC_ADDR}"}{kc_realms_path}/${r"${KC_REALM}"}/.well-known/openid-configuration
OIDCClientID ${CLIENT_ID} OIDCClientID ${r"${CLIENT_ID}"}
OIDCClientSecret ${CLIENT_SECRET} OIDCClientSecret ${r"${CLIENT_SECRET}"}
OIDCRedirectURI http://${HOSTIP}/${CLIENT_APP_NAME}/redirect_uri OIDCRedirectURI http://${r"${HOSTIP}"}/${r"${CLIENT_APP_NAME}"}/redirect_uri
# maps the preferred_username claim to the REMOTE_USER environment variable # maps the preferred_username claim to the REMOTE_USER environment variable
OIDCRemoteUserClaim preferred_username OIDCRemoteUserClaim preferred_username
<Location /${CLIENT_APP_NAME}/> <Location /${r"${CLIENT_APP_NAME}"}/>
AuthType openid-connect AuthType openid-connect
Require valid-user Require valid-user
</Location> </Location>
@ -50,3 +56,5 @@ ServerName ${HOSTIP}
Further information on how to configure mod_auth_openidc can be found on the https://github.com/OpenIDC/mod_auth_openidc[mod_auth_openidc] Further information on how to configure mod_auth_openidc can be found on the https://github.com/OpenIDC/mod_auth_openidc[mod_auth_openidc]
project page. project page.
</@tmpl.guide>