diff --git a/step-ca/provisioners.mdx b/step-ca/provisioners.mdx index 343f48d2..731959a1 100644 --- a/step-ca/provisioners.mdx +++ b/step-ca/provisioners.mdx @@ -1,5 +1,5 @@ --- -updated_at: March 27, 2025 +updated_at: June 17, 2025 title: Configuring `step-ca` Provisioners html_title: Configuring open source step-ca Provisioners description: Learn how to configure step-ca Provisioners @@ -645,6 +645,7 @@ Example `ca.json` provisioner configuration for a Google provisioner: "configurationEndpoint": "https://accounts.google.com/.well-known/openid-configuration", "admins": ["you@smallstep.com"], "domains": ["smallstep.com"], + "scopes": ["openid", "email"], "listenAddress": ":10000", "claims": { "maxTLSCertDuration": "8h", @@ -676,6 +677,8 @@ Example `ca.json` provisioner configuration for a Google provisioner: - **domains**: is the list of domains valid. If provided only the emails with the provided domains will be able to authenticate. +- **scopes**: a list of scopes OAuth clients should request. This is used by the `step` CLI. The default value is `["openid","email"]`. + - **listenAddress**: is the address (`:port` or `host:port`) where the authorization server will redirect the client's web browser at the end of the authorization flow. By default, the `step` client will bind to 127.0.0.1 on a random port. This parameter is only required if the authorization server demands a specific port for loopback IP redirect URIs. - **claims**: overwrites the default claims set in the authority,