diff --git a/docs/docs/documentation/getting-started/installation.md b/docs/docs/documentation/getting-started/installation.md index 7133fae82..7d68636aa 100644 --- a/docs/docs/documentation/getting-started/installation.md +++ b/docs/docs/documentation/getting-started/installation.md @@ -89,10 +89,10 @@ If keycloak is up and ready then you can start the initialization: 2. Name: **dmp_web** 3. Front channel logout: **Off** 3. Access settings: - 1. Root URL: https://{APP_URL}/home - 2. Home URL: https://{APP_URL}/home - 3. Valid redirect URIs: https://{APP_URL}/* - 4. Web Origins: https://{APP_URL} + 1. Root URL: https://(APP_URL)/home + 2. Home URL: https://(APP_URL)/home + 3. Valid redirect URIs: https://(APP_URL)/* + 4. Web Origins: https://(APP_URL) 4. Capability config: 1. Client Authentication: **Off** 2. Authorization: **Off** @@ -291,7 +291,7 @@ If keycloak is up and ready then you can start the initialization: 1. Create User: 1. Email Verified: On 2. Username: argos-admin - 3. Email: {ADMIN_EMAIL} (ex. argos@admin.gr) + 3. Email: (ADMIN_EMAIL) (ex. argos@admin.gr) 4. firstName: Argos 5. lastName: Admin 2. Credentials: @@ -310,7 +310,7 @@ If keycloak is up and ready then you can start the initialization: 1. Create User: 1. Email Verified: On 2. Username: dmp-keycloak-api - 3. Email: {API_EMAIL} (ex. dmp-keycloak-api@gmail.com) + 3. Email: (API_EMAIL) (ex. dmp-keycloak-api@gmail.com) 4. firstName: dmp 5. lastName: keycloak 2. Credentials: @@ -337,20 +337,20 @@ If keycloak is up and ready then you can start the initialization: ## 8) Identity Providers: 1. Google IDP: 1. On the Settings section add the required creds: - 1. Redirect URI: https://{KEYCLOAK_URL}/realms/{REALM_NAME}/broker/google/endpoint - 2. Client ID: {GOOGLE_CLIENT_ID} - 3. Client Secret: {GOOGLE_CLIENT_SECRET} + 1. Redirect URI: https://(KEYCLOAK_URL)/realms/(REALM_NAME)/broker/google/endpoint + 2. Client ID: (GOOGLE_CLIENT_ID) + 3. Client Secret: (GOOGLE_CLIENT_SECRET) 2. After Creating the IDP, on the Mappers section add a mapper: 1. Name: **identity_provider** 2. Sync mode override: **Force** 3. Mapper type: **Hardcoded User Session Attribute** 4. User Session Attribute: **identity_provider** 5. User Session Attribute Value **google** -2. OpenAIRE AAI Beta or ({IDP_NAME}): +2. OpenAIRE AAI Beta or ((IDP_NAME)): 1. Create a "Keycloak OpenID Connect" type IDP - 2. Redirect URI: https://{KEYCLOAK_URL}/realms/{REALM_NAME}/broker/{ALIAS_NAME}/endpoint - 3. Alias: {ALIAS_NAME} - 4. Display name: {IDP_NAME} + 2. Redirect URI: https://(KEYCLOAK_URL)/realms/(REALM_NAME)/broker/(ALIAS_NAME)/endpoint + 3. Alias: (ALIAS_NAME) + 4. Display name: (IDP_NAME) 5. Use discovery endpoint: **Off** 6. Authorization URL: https://beta.aai.openaire.eu/auth/realms/openaire/protocol/openid-connect/auth 7. Token URL: https://beta.aai.openaire.eu/auth/realms/openaire/protocol/openid-connect/token @@ -362,8 +362,8 @@ If keycloak is up and ready then you can start the initialization: 13. JWKS URL: https://beta.aai.openaire.eu/auth/realms/openaire/protocol/openid-connect/certs 14. Use PKCE: **Off** 15. Client authentication: **Client secret sent as post** - 16. Client ID: {CLIENT_ID} - 17. Client Secret: {CLIENT_SECRET} + 16. Client ID: (CLIENT_ID) + 17. Client Secret: (CLIENT_SECRET) 18. Client assertion signature algorithm: **Algorithm not specified** 19. Store tokens: **Off** 20. Stored tokens readable: **Off**