Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Docs migration #86

Open
wants to merge 2 commits into
base: master
Choose a base branch
from
Open

Docs migration #86

wants to merge 2 commits into from

Conversation

timja
Copy link
Member

@timja timja commented Jan 12, 2020

Yunir
Yunir approved these changes Feb 18, 2020
README.md Outdated Show resolved Hide resolved
Co-Authored-By: YSalimzyanov <yunir.me@gmail.com>
Scripted clients can still interact with Jenkins even when the openid
connect plugin is active: they will have to use an API
token. 
[Authenticating scripted clients](https://wiki.jenkins.io/display/JENKINS/Authenticating+scripted+clients) describes
Copy link
Member

@Yunir Yunir Feb 18, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It will be better to substitute this wiki-page URL with analogous jenkins.io/doc/.. page.

Copy link
Member Author

@timja timja Feb 18, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think there is one

@jglick
Copy link
Member

@jglick jglick commented Mar 23, 2021

@mjmbischoff @LinuxSuRen is there a maintainer here?


### Using g-suite / google

Obtain the client id and secret from the developer console: https://console.cloud.google.com/apis/credentials by creating Oauth client id.
Copy link
Member

@jglick jglick Mar 23, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

To be more explicit, you need to specify https://jenkins.mycorp under Authorized JavaScript origins and https://jenkins.mycorp/securityRealm/finishLogin under Authorized redirect URIs.


Well-known configuration: https://accounts.google.com/.well-known/openid-configuration

see also: <https://developers.google.com/identity/protocols/OpenIDConnect>
Copy link
Member

@jglick jglick Mar 23, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

And you should also set Full name field name to name and Email field name to email (weird that these are not defaults, since https://openid.net/specs/openid-connect-core-1_0.html#StandardClaims defines them).

@LinuxSuRen
Copy link
Member

@LinuxSuRen LinuxSuRen commented Mar 24, 2021

@mjmbischoff @LinuxSuRen is there a maintainer here?

I try to review PRs. But I cannot guarantee the time.

@zbynek
Copy link

@zbynek zbynek commented Aug 27, 2021

@LinuxSuRen will you have time to review this?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants