-
Notifications
You must be signed in to change notification settings - Fork 1.8k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
3 changed files
with
162 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
kind: oidc | ||
metadata: | ||
name: oidc_connector | ||
spec: | ||
# Login settings | ||
client_id: <LOGIN-CLIENT-NAME> | ||
client_secret: <LOGIN-CLIENT-SECRET> | ||
issuer_url: https://idp.example.com/ | ||
redirect_url: https://mytenant.teleport.sh:443/v1/webapi/oidc/callback | ||
# ... | ||
|
||
# MFA settings | ||
mfa: | ||
# Enabled specified whether this OIDC connector supports MFA checks. | ||
enabled: true | ||
# client_id and client_secret should point to an IdP configured | ||
# app configured to handle MFA checks. In most cases, these values | ||
# should be different from your login client ID and Secret above. | ||
client_id: <MFA-CLIENT-NAME> | ||
client_secret: <MFA-CLIENT-SECRET> | ||
# prompt can be set to request a specific prompt flow from the IdP. Supported | ||
# values depend on the IdP. | ||
prompt: none | ||
# acr_values are Authentication Context Class Reference values. These values | ||
# are context-specific and vary depending on the IdP. | ||
acr_values: [] | ||
# max_age is the amount of time in seconds that an IdP session is valid for. | ||
# Defaults to 0 to always force re-authentication for MFA checks. This should | ||
# only be set to a non-zero value if the IdP is setup to perform MFA checks on | ||
# top of active user sessions. | ||
max_age: 0 | ||
|
||
version: v3 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,28 @@ | ||
# | ||
# Example resource for a SAML connector | ||
# This connector can be used for SAML endpoints like Okta | ||
# | ||
kind: saml | ||
version: v2 | ||
metadata: | ||
# the name of the connector | ||
name: okta | ||
spec: | ||
# Login settings | ||
display: Okta | ||
entity_descriptor_url: https://example.okta.com/app/<LOGIN-APP-ID>/sso/saml/metadata | ||
acs: https://<cluster-url>/v1/webapi/saml/acs/new_saml_connector | ||
# ... | ||
|
||
# MFA settings | ||
mfa: | ||
# Enabled specified whether this SAML connector supports MFA checks. | ||
enabled: true | ||
# entity_descriptor_url should point to an IdP configured app that handles MFA checks. | ||
# In most cases, this value should be different from the entity_descriptor_url above. | ||
entity_descriptor_url: https://example.okta.com/app/<MFA-APP-ID>/sso/saml/metadata | ||
# force_reauth determines whether existing login sessions are accepted or if | ||
# re-authentication is always required. Defaults to "yes". This should only be | ||
# set to false if the app described above is setup to perform MFA checks on top | ||
# of active user sessions. | ||
force_reauth: yes |