From ec4403ddfa4bc7f7487df38c3860ac5b4b264ee5 Mon Sep 17 00:00:00 2001 From: Jan Lieskovsky Date: Mon, 21 Jan 2019 17:50:00 +0100 Subject: [PATCH] [KEYCLOAK-9361] Replace reference to OpenShift Primer book with reference to latest OCP version install OpenShift Primer is very outdated (recommends OpenShift Enterprise v3.2 yet), while latest OCP version is v3.11. As such, the recommended OpenShift Primer steps aren't working to get fresh OCP install up & running Signed-off-by: Jan Lieskovsky --- openshift/topics/before_you_begin.adoc | 2 +- openshift/topics/tutorials.adoc | 6 +++--- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/openshift/topics/before_you_begin.adoc b/openshift/topics/before_you_begin.adoc index aaceefe203..f49ee42c11 100644 --- a/openshift/topics/before_you_begin.adoc +++ b/openshift/topics/before_you_begin.adoc @@ -18,7 +18,7 @@ The {project_openshift_product_name} image version number 7.0 and 7.1 are deprec ==== === Initial Setup -The Tutorials in this guide follow on from and assume an OpenShift instance similar to that created in the https://access.redhat.com/documentation/en/red-hat-xpaas/0/single/openshift-primer[OpenShift Primer]. +The Tutorials in this guide follow on from and assume an OpenShift instance similar to that created by performing https://docs.openshift.com/container-platform/latest/install/index.html[the installation of the OpenShift Container Platform cluster]. [IMPORTANT] ==== diff --git a/openshift/topics/tutorials.adoc b/openshift/topics/tutorials.adoc index 8be4347cb5..cf8bfde4e2 100644 --- a/openshift/topics/tutorials.adoc +++ b/openshift/topics/tutorials.adoc @@ -734,7 +734,7 @@ The administration console import allows you to *overwrite* resources if you cho === Example Workflow: Configuring OpenShift to use {project_name} for Authentication Configure OpenShift to use the {project_name} deployment as the authorization gateway for OpenShift. This follows on from xref:Example-Deploying-SSO[Example Workflow: Preparing and Deploying the {project_openshift_product_name} image], in which {project_name} was deployed on OpenShift. -This example adds {project_name} as an authentication method alongside the HTPasswd method configured in the https://access.redhat.com/documentation/en/red-hat-xpaas/0/single/openshift-primer/#understand_roles_and_authentication[OpenShift Primer]. Once configured, both methods will be available for user login to your OpenShift web console. +This example adds {project_name} as an authentication method alongside https://docs.openshift.com/container-platform/latest/install_config/configuring_authentication.html#identity-providers-configuring[the identity providers] configured during https://docs.openshift.com/container-platform/latest/install/index.html[the installation of the OpenShift Container Platform cluster]. Once configured, the {project_name} method will be also available (together with the configured identity providers) for the user login to your OpenShift web console. ==== Configuring {project_name} Credentials Log in to the encrypted {project_name} web server at *$$https://secure-sso-$$_sso-app-demo_._openshift32.example.com_/auth/admin* using the xref:sso-administrator-setup[administrator account] created during the {project_name} deployment. @@ -767,10 +767,10 @@ See the link:https://access.redhat.com/documentation/en-us/red_hat_single_sign-o The client *Secret* is needed to configure OpenID-Connect on the OpenShift master in the next section. You can copy it now from under the *Credentials* tab. The secret is for this example. -==== Configuring OpenShift Master for Red Hat Single Sign-On Authentication +==== Configuring OpenShift Master for {project_name} Authentication Log in to the OpenShift master CLI. You must have the required permissions to edit the */etc/origin/master/master-config.yaml* file. -. Edit the */etc/origin/master/master-config.yaml* file and find the *identityProviders*. The OpenShift master, which was deployed using the OpenShift Primer, is configured with HTPassword and shows the following: +. Edit the */etc/origin/master/master-config.yaml* file and find the *identityProviders*. For example, in the case the OpenShift master is configured with the https://docs.openshift.com/container-platform/latest/install_config/configuring_authentication.html#HTPasswdPasswordIdentityProvider[HTPassword identity provider], the *identityProviders* section will look similar to the following one: + [source,bash,subs="attributes+,macros+"] ----