mirror of
https://github.com/funkypenguin/geek-cookbook/
synced 2025-12-15 02:36:38 +00:00
No need for custom property mapper
Signed-off-by: David Young <davidy@funkypenguin.co.nz>
This commit is contained in:
@@ -41,15 +41,10 @@ Scroll down, and set:
|
||||
|
||||

|
||||
|
||||
Under **Advanced Protocol Settings**, below the set the scopes to include the built-in `email` scope, as well as the extra `oidc-groups` scope you added when [initially setting up authentik][k8s/authentik]:
|
||||
|
||||

|
||||
|
||||
Finally, enable **Include claims in id_token**, instructing authentik to send the user claims back with the id token:
|
||||
|
||||

|
||||
|
||||
|
||||
..and click **Finish**. On the following summary page, under **OAuth2 Provider**, take note of the **OpenID Configuration** URL (*`/application/o/kube-apiserver/.well-known/openid-configuration` if you followed my conventions above*) - you'll need this when configuring Kubernetes.
|
||||
|
||||
!!! question "What's that redirect URI for?"
|
||||
|
||||
@@ -76,7 +76,7 @@ kubectl oidc-login setup \
|
||||
All going well, your browser will open a new window, logging you into authentik, and on the CLI you should get output something like this:
|
||||
|
||||
```
|
||||
~ ❯ kubectl oidc-login setup --oidc-issuer-url=https://authentik.example.com/application/o/kube-apiserver/ --oidc-client-id=kube-apiserver --oidc-client-secret=cVj4YqmB4VPcq6e7 --oidc-extra-scope=groups,email
|
||||
~ ❯ kubectl oidc-login setup --oidc-issuer-url=https://authentik.example.com/application/o/kube-apiserver/ --oidc-client-id=kube-apiserver --oidc-client-secret=cVj4YqmB4VPcq6e7 --oidc-extra-scope=profile,email
|
||||
authentication in progress...
|
||||
|
||||
## 2. Verify authentication
|
||||
@@ -126,7 +126,7 @@ kubectl config set-credentials oidc \
|
||||
--exec-arg=--oidc-issuer-url=https://authentik.example.com/application/o/kube-apiserver/ \
|
||||
--exec-arg=--oidc-client-id=kube-apiserver \
|
||||
--exec-arg=--oidc-client-secret=<your client secret> \
|
||||
--exec-arg=--oidc-extra-scope=groups \
|
||||
--exec-arg=--oidc-extra-scope=profile \
|
||||
--exec-arg=--oidc-extra-scope=email
|
||||
```
|
||||
|
||||
|
||||
Reference in New Issue
Block a user