-
Bug
-
Resolution: Unresolved
-
Critical
-
None
-
1.9.0
-
8
-
False
-
-
False
-
-
We started from a simple outline focused on "one identity provider":
# Enabling authentication with RHBK
- Enabling authentication with GitHub
- etc
But special cases appeared afterwards: customers authenticate with a main Idp (RHBK, Azure), but need to also authenticate to external services, usually the Git provider, usually GitHub. The provider centric approach does not work anymore.
Now we better identify the successive jobs to be done, and the mix-and-match scenario.
Therefore a better organization for the entire title could be:
- Enable or disable authentication with the guest user (to work without an idp on development environments)
- Share a secret with your Identity provider to enable secure communication (one or many)
- RHBK
- LDAP
- GitHub
- Azure
- GitLab
- Import users from your identity provider to the RHDH software catalog (one main source of truth, can be completed by optional secondary idp)
- RHBK
- Optional: create a custom transformer
- LDAP
- Optional: create a custom transformer
- GitHub
- Optional: create a custom transformer
- Azure
- Optional: create a custom transformer
- GitLab
- Optional: create a custom transformer
- RHBK
- Enable authentication with your (main) identity provider (pick one)
- RHBK
- GitHub
- Azure
- GitLab
- Enable authentication with external services (multiple services; different from: integrate with other services, which require more config, and is in another title)
- Enable authentication with your secondary identity provider
- GitHub to exemplify a generic procedure
- Enable Service To Service authentication
- Using static tokens
- Using JWKS
- Set access restrictins to external services tokens
- Enable authentication with your secondary identity provider
- Enable auto-logout for inactive users
- Troubleshoot authentication issues