mirror of
https://github.com/oauth2-proxy/oauth2-proxy.git
synced 2024-12-10 11:10:27 +02:00
43f214ce8b
* Adding one more example - keycloak - alongside with dex IDP. * don't expose keycloak and proxy ports to the host * specify email-domain list option in documentation * get rid of nginx and socat to simplify the example as per https://github.com/oauth2-proxy/oauth2-proxy/pull/604#issuecomment-640054390 * get rid of the scripts - use static file for keycloak startup * changelog entry * Update CHANGELOG.md Co-authored-by: Joel Speed <Joel.speed@hotmail.co.uk>
21 lines
799 B
INI
21 lines
799 B
INI
http_address="0.0.0.0:4180"
|
|
cookie_secret="OQINaROshtE9TcZkNAm-5Zs2Pv3xaWytBmc5W7sPX7w="
|
|
email_domains=["example.com"]
|
|
cookie_secure="false"
|
|
upstreams="http://httpbin"
|
|
cookie_domains=[".localtest.me"] # Required so cookie can be read on all subdomains.
|
|
whitelist_domains=[".localtest.me"] # Required to allow redirection back to original requested target.
|
|
|
|
# keycloak provider
|
|
client_secret="72341b6d-7065-4518-a0e4-50ee15025608"
|
|
client_id="oauth2-proxy"
|
|
redirect_url="http://oauth2-proxy.localtest.me:4180/oauth2/callback"
|
|
|
|
# in this case oauth2-proxy is going to visit
|
|
# http://keycloak.localtest.me:9080/auth/realms/master/.well-known/openid-configuration for configuration
|
|
oidc_issuer_url="http://keycloak.localtest.me:9080/auth/realms/master"
|
|
provider="oidc"
|
|
provider_display_name="Keycloak"
|
|
|
|
|