Skip to content

Commit

Permalink
more with redirect uri
Browse files Browse the repository at this point in the history
  • Loading branch information
ymarcon committed Mar 17, 2022
1 parent 2aa38ca commit 4caab48
Show file tree
Hide file tree
Showing 3 changed files with 10 additions and 2 deletions.
2 changes: 2 additions & 0 deletions oauth2-api/index.rst
Original file line number Diff line number Diff line change
@@ -1,3 +1,5 @@
.. _oauth:

OAuth2 Introduction
===================

Expand Down
6 changes: 5 additions & 1 deletion web-user-guide/applications.rst
Original file line number Diff line number Diff line change
@@ -1,7 +1,11 @@
.. _applications_management:

Applications Management
=======================

An application is an external system that can use agate as a central authentication system. Once an application is registered in agate, it can use its credentials (name and key) to connect with agate. See also :ref:`domain-application` domain documentation.
An application is an external system that can use Agate as a central authentication system. Once an application is registered in agate, it can use its credentials (name and key) to connect with agate. See also :ref:`domain-application` domain documentation.

When Agate delegates the authentication to an external :ref:`oidc_realm` or when using OAuth2 service (see :ref:`oauth`), the redirect URI must be set so that Agate performs the redirect to a known application after successful authentication. Wildcard ``*`` can be used in this configured redirect URI.

The application pages are: the list of applications page and application view and edit pages.

Expand Down
4 changes: 3 additions & 1 deletion web-user-guide/realms.rst
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,8 @@ Agate is able to delegate authentication to alternate identity provider systems.
Realm Types
-----------

.. _oidc_realm:

Open ID Connect Realm
~~~~~~~~~~~~~~~~~~~~~

Expand All @@ -18,7 +20,7 @@ A realm that uses the OpenID Connect (`OIDC <https://openid.net/connect/>`_) pro
To register Agate as a client of the OIDC provider it will be necessary to provide its callback URL which is: ``https://agate.example.org/auth/callback/``.

.. note::
For Agate to authenticate for an :ref:`domain-application`, its redirect URI must be set.
For Agate to authenticate for an :ref:`domain-application`, the redirect URI of the Application must be set (see :ref:`applications_management`).

An example of well known open source ID provider that can be declared as an OIDC realm is `Keycloak <https://www.keycloak.org/>`_. Keycloak has also a strong user federation feature, which we recommend to use instead of using the following other realm types (LDAP etc.).

Expand Down

0 comments on commit 4caab48

Please sign in to comment.