This repository has been archived by the owner. It is now read-only.

Implementation of OIDC provider based on Generic OAuth. #2

Merged
merged 1 commit into from Apr 25, 2018

Conversation

Projects
None yet
5 participants
@PavelTishkin
Contributor

PavelTishkin commented Apr 18, 2018

Signed-off-by: Tishkin, Pavlo pavlo.tishkin@fmr.com

Implementation of OIDC provider based on Generic OAuth.
Signed-off-by: Tishkin, Pavlo <pavlo.tishkin@fmr.com>
@pivotal-jwinters

Looks good to me.

Corresponding PRs:
concourse/atc#264
concourse/fly#217

@PavelTishkin PavelTishkin reopened this Apr 23, 2018

@pivotal-jwinters pivotal-jwinters merged commit 5369d50 into concourse:master Apr 25, 2018

1 check passed

ci/pivotal-cla Thank you for signing the Contributor License Agreement!
Details

@jama-pivotal jama-pivotal modified the milestone: v3.13.0 Apr 30, 2018

@mvdkleijn

This comment has been minimized.

mvdkleijn commented May 2, 2018

Is there some docs for this here thingie somewhere? 😄

@PavelTishkin

This comment has been minimized.

Contributor

PavelTishkin commented May 2, 2018

@mvdkleijn, try fly set-team --help to get list of available providers and flags.
To authenticate with OIDC, your auth provider needs to return a token as per standard.
Optionally, include a groups field in the token to validate via groups.

@avanier

This comment has been minimized.

avanier commented May 3, 2018

I think this implicitly resolves concourse/concourse#2015 .

@mvdkleijn

This comment has been minimized.

mvdkleijn commented May 7, 2018

@PavelTishkin I meant on the site, but I guess docs are updated separately from the feature PRs. 😄

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.