remove brackets from md
This commit is contained in:
parent
cae4003af5
commit
fb38aa379e
|
@ -89,10 +89,10 @@ If keycloak is up and ready then you can start the initialization:
|
|||
2. Name: **dmp_web**
|
||||
3. Front channel logout: **Off**
|
||||
3. Access settings:
|
||||
1. Root URL: https://{APP_URL}/home
|
||||
2. Home URL: https://{APP_URL}/home
|
||||
3. Valid redirect URIs: https://{APP_URL}/*
|
||||
4. Web Origins: https://{APP_URL}
|
||||
1. Root URL: https://(APP_URL)/home
|
||||
2. Home URL: https://(APP_URL)/home
|
||||
3. Valid redirect URIs: https://(APP_URL)/*
|
||||
4. Web Origins: https://(APP_URL)
|
||||
4. Capability config:
|
||||
1. Client Authentication: **Off**
|
||||
2. Authorization: **Off**
|
||||
|
@ -291,7 +291,7 @@ If keycloak is up and ready then you can start the initialization:
|
|||
1. Create User:
|
||||
1. Email Verified: On
|
||||
2. Username: argos-admin
|
||||
3. Email: {ADMIN_EMAIL} (ex. argos@admin.gr)
|
||||
3. Email: (ADMIN_EMAIL) (ex. argos@admin.gr)
|
||||
4. firstName: Argos
|
||||
5. lastName: Admin
|
||||
2. Credentials:
|
||||
|
@ -310,7 +310,7 @@ If keycloak is up and ready then you can start the initialization:
|
|||
1. Create User:
|
||||
1. Email Verified: On
|
||||
2. Username: dmp-keycloak-api
|
||||
3. Email: {API_EMAIL} (ex. dmp-keycloak-api@gmail.com)
|
||||
3. Email: (API_EMAIL) (ex. dmp-keycloak-api@gmail.com)
|
||||
4. firstName: dmp
|
||||
5. lastName: keycloak
|
||||
2. Credentials:
|
||||
|
@ -337,20 +337,20 @@ If keycloak is up and ready then you can start the initialization:
|
|||
## 8) Identity Providers:
|
||||
1. Google IDP:
|
||||
1. On the Settings section add the required creds:
|
||||
1. Redirect URI: https://{KEYCLOAK_URL}/realms/{REALM_NAME}/broker/google/endpoint
|
||||
2. Client ID: {GOOGLE_CLIENT_ID}
|
||||
3. Client Secret: {GOOGLE_CLIENT_SECRET}
|
||||
1. Redirect URI: https://(KEYCLOAK_URL)/realms/(REALM_NAME)/broker/google/endpoint
|
||||
2. Client ID: (GOOGLE_CLIENT_ID)
|
||||
3. Client Secret: (GOOGLE_CLIENT_SECRET)
|
||||
2. After Creating the IDP, on the Mappers section add a mapper:
|
||||
1. Name: **identity_provider**
|
||||
2. Sync mode override: **Force**
|
||||
3. Mapper type: **Hardcoded User Session Attribute**
|
||||
4. User Session Attribute: **identity_provider**
|
||||
5. User Session Attribute Value **google**
|
||||
2. OpenAIRE AAI Beta or ({IDP_NAME}):
|
||||
2. OpenAIRE AAI Beta or ((IDP_NAME)):
|
||||
1. Create a "Keycloak OpenID Connect" type IDP
|
||||
2. Redirect URI: https://{KEYCLOAK_URL}/realms/{REALM_NAME}/broker/{ALIAS_NAME}/endpoint
|
||||
3. Alias: {ALIAS_NAME}
|
||||
4. Display name: {IDP_NAME}
|
||||
2. Redirect URI: https://(KEYCLOAK_URL)/realms/(REALM_NAME)/broker/(ALIAS_NAME)/endpoint
|
||||
3. Alias: (ALIAS_NAME)
|
||||
4. Display name: (IDP_NAME)
|
||||
5. Use discovery endpoint: **Off**
|
||||
6. Authorization URL: https://beta.aai.openaire.eu/auth/realms/openaire/protocol/openid-connect/auth
|
||||
7. Token URL: https://beta.aai.openaire.eu/auth/realms/openaire/protocol/openid-connect/token
|
||||
|
@ -362,8 +362,8 @@ If keycloak is up and ready then you can start the initialization:
|
|||
13. JWKS URL: https://beta.aai.openaire.eu/auth/realms/openaire/protocol/openid-connect/certs
|
||||
14. Use PKCE: **Off**
|
||||
15. Client authentication: **Client secret sent as post**
|
||||
16. Client ID: {CLIENT_ID}
|
||||
17. Client Secret: {CLIENT_SECRET}
|
||||
16. Client ID: (CLIENT_ID)
|
||||
17. Client Secret: (CLIENT_SECRET)
|
||||
18. Client assertion signature algorithm: **Algorithm not specified**
|
||||
19. Store tokens: **Off**
|
||||
20. Stored tokens readable: **Off**
|
||||
|
|
Loading…
Reference in New Issue