Add note on subdomain behaviour
This commit is contained in:
		
							parent
							
								
									bc4d5941fc
								
							
						
					
					
						commit
						81f77a55de
					
				|  | @ -237,8 +237,11 @@ Usage of oauth2_proxy: | ||||||
|   -upstream value: the http url(s) of the upstream endpoint or file:// paths for static files. Routing is based on the path |   -upstream value: the http url(s) of the upstream endpoint or file:// paths for static files. Routing is based on the path | ||||||
|   -validate-url string: Access token validation endpoint |   -validate-url string: Access token validation endpoint | ||||||
|   -version: print version string |   -version: print version string | ||||||
|  |   -whitelist-domain: allowed domains for redirection after authentication. Prefix domain with a . to allow subdomains (eg .example.com) | ||||||
| ``` | ``` | ||||||
| 
 | 
 | ||||||
|  | Note, when using the `whitelist-domain` option, any domain prefixed with a `.` will allow any subdomain of the specified domain as a valid redirect URL. | ||||||
|  | 
 | ||||||
| See below for provider specific options | See below for provider specific options | ||||||
| 
 | 
 | ||||||
| ### Upstreams Configuration | ### Upstreams Configuration | ||||||
|  |  | ||||||
							
								
								
									
										2
									
								
								main.go
								
								
								
								
							
							
						
						
									
										2
									
								
								main.go
								
								
								
								
							|  | @ -46,7 +46,7 @@ func main() { | ||||||
| 	flagSet.Bool("ssl-insecure-skip-verify", false, "skip validation of certificates presented when using HTTPS") | 	flagSet.Bool("ssl-insecure-skip-verify", false, "skip validation of certificates presented when using HTTPS") | ||||||
| 
 | 
 | ||||||
| 	flagSet.Var(&emailDomains, "email-domain", "authenticate emails with the specified domain (may be given multiple times). Use * to authenticate any email") | 	flagSet.Var(&emailDomains, "email-domain", "authenticate emails with the specified domain (may be given multiple times). Use * to authenticate any email") | ||||||
| 	flagSet.Var(&whitelistDomains, "whitelist-domain", "allowed domains for redirection after authentication") | 	flagSet.Var(&whitelistDomains, "whitelist-domain", "allowed domains for redirection after authentication. Prefix domain with a . to allow subdomains (eg .example.com)") | ||||||
| 	flagSet.String("azure-tenant", "common", "go to a tenant-specific or common (tenant-independent) endpoint.") | 	flagSet.String("azure-tenant", "common", "go to a tenant-specific or common (tenant-independent) endpoint.") | ||||||
| 	flagSet.String("github-org", "", "restrict logins to members of this organisation") | 	flagSet.String("github-org", "", "restrict logins to members of this organisation") | ||||||
| 	flagSet.String("github-team", "", "restrict logins to members of this team") | 	flagSet.String("github-team", "", "restrict logins to members of this team") | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue