-
Notifications
You must be signed in to change notification settings - Fork 253
How to use OIDC classes #1034
Comments
@mousumi16 Hi~ |
We are working on an operator upgrade. After we upgrade operator to v3, you can add this envs to CR to support OIDC: spec:
server:
env:
- name: SUBMARINE_AUTH_TYPE
value: oidc
- name: SUBMARINE_AUTH_OIDC_CLIENT_ID
value: "${YOUR_CLIENT_ID}"
- name: SUBMARINE_AUTH_OIDC_CLIENT_SECRET
value: "${YOUR_CLIENT_SECRET}"
- name: SUBMARINE_AUTH_OIDC_DISCOVER_URI
value: "${YOUR_DISCOVER_URI}" |
Hi @cdmikechen , When are you going to release the v3 to support OIDC? And in the LoginRestApi class, SimpleLoginConfig is used to generate the token. So in this case its not using the OIDC , please let me know , how to invoke the OIDC classes. I have seen OidcConfig class , the client id , secret should be added in this class? If you can add a help file on the OIDC classes and how to use them that will be really helpfull. Thanks |
@mousumi16 |
Hi @cdmikechen , Thanks |
@mousumi16 submarine/submarine-cloud-v3/controllers/submarine_server.go Lines 98 to 102 in 9347fe5
We use pac4j to handle the authentication of oidc, using a method that mainly makes use of a |
Hi @cdmikechen , Can you please tell me the config file details , for connecting with OIDC? Thanks |
@cdmikechen
Please give a sample code on how to use the newly added OIDC feature in apache submarine.
claimsMap.put("jti", sysUser.getId());
// TODO(cdmikechen) By default the simple token is used,
// in other cases such as ldap it may need to be returned as an interface
String token = SimpleLoginConfig.getJwtGenerator().generate(claimsMap);
the above code comment is added with OIDC feature. What does this mean and how the OIDC login is going to work?
where to provide the client id n secret details to connect to Keycloak ?
Please guide on this.
The text was updated successfully, but these errors were encountered: