Open ID Connect (OIDC)
StackState Self-hosted
Overview
Configure the OIDC provider
Configure StackState for OIDC
Kubernetes
stackstate:
authentication:
oidc:
clientId: "<client-id-from-oidc-provider>"
secret: "<secret-from-oidc-provider>"
discoveryUri: "https://oidc.acme.com/.well-known/openid-configuration"
jwsAlgorithm: RS256
scope: ["openid", "email"]
jwtClaims:
usernameField: email
groupsField: groups
customParameters:
access_type: offline
# map the groups from OIDC provider
# to the 4 standard roles in StackState (guest, powerUser, admin and platformAdmin)
roles:
guest: ["oidc-guest-role-for-stackstate"]
powerUser: ["oidc-power-user-role-for-stackstate"]
admin: ["oidc-admin-role-for-stackstate"]
platformAdmin: ["oidc-platform-admin-role-for-stackstate"]Additional settings for specific OIDC providers
Microsoft Identity Platform
See also
Last updated