From bd5fab478d88975ea5e5e6b7b22691fa716f08e4 Mon Sep 17 00:00:00 2001 From: Tomoyuki KOYAMA Date: Sat, 29 Aug 2020 17:26:24 +0900 Subject: [PATCH] fix docs: command line options (#744) --- docs/2_auth.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/2_auth.md b/docs/2_auth.md index 8b7c3660..974dfbc9 100644 --- a/docs/2_auth.md +++ b/docs/2_auth.md @@ -244,7 +244,7 @@ The `oidc_issuer_url` is based on URL from your **Authorization Server**'s **Iss The `client_id` and `client_secret` are configured in the application settings. Generate a unique `client_secret` to encrypt the cookie. -Then you can start the oauth2-proxy with `./oauth2-proxy -config /etc/example.cfg` +Then you can start the oauth2-proxy with `./oauth2-proxy --config /etc/example.cfg` #### Configuring the OIDC Provider with Okta - localhost 1. Signup for developer account: https://developer.okta.com/signup/ @@ -278,7 +278,7 @@ Then you can start the oauth2-proxy with `./oauth2-proxy -config /etc/example.cf # Note: use the following for testing within a container # http_address = "0.0.0.0:4180" ``` -7. Then you can start the oauth2-proxy with `./oauth2-proxy -config /etc/localhost.cfg` +7. Then you can start the oauth2-proxy with `./oauth2-proxy --config /etc/localhost.cfg` ### login.gov Provider