mirror of
https://github.com/funkypenguin/geek-cookbook/
synced 2026-01-06 13:29:19 +00:00
Improve title on recipes
This commit is contained in:
@@ -1,3 +1,7 @@
|
||||
---
|
||||
title: Integrate LDAP server with Keycloak for user federation
|
||||
description: Here's how we'll add an LDAP provider to our KeyCloak server for user federation.
|
||||
---
|
||||
# Authenticate KeyCloak against OpenLDAP
|
||||
|
||||
!!! warning
|
||||
|
||||
@@ -1,4 +1,8 @@
|
||||
# Create KeyCloak Users
|
||||
---
|
||||
title: Create users in Keycloak
|
||||
description: Unless you plan to authenticate against an outside provider (OpenLDAP, below, for example_), you'll want to create some local users..
|
||||
---
|
||||
# Create Keycloak Users
|
||||
|
||||
!!! warning
|
||||
This is not a complete recipe - it's an optional component of the [Keycloak recipe](/recipes/keycloak/), but has been split into its own page to reduce complexity.
|
||||
|
||||
@@ -1,4 +1,5 @@
|
||||
---
|
||||
title: How to setup OIDC server in Docker with KeyCloak
|
||||
description: Kick-ass OIDC and identity management
|
||||
---
|
||||
|
||||
|
||||
@@ -1,3 +1,7 @@
|
||||
---
|
||||
title: How to setup OIDC provider in KeyCloak
|
||||
description: Having an authentication provider is not much use until you start authenticating things against it! In order to authenticate against KeyCloak using OpenID Connect (OIDC), which is required for Traefik Forward Auth, we'll setup a client in KeyCloak...
|
||||
---
|
||||
# Add OIDC Provider to KeyCloak
|
||||
|
||||
!!! warning
|
||||
|
||||
Reference in New Issue
Block a user