From f9de0e840c777aae252e7d9da1e8c42403c28766 Mon Sep 17 00:00:00 2001 From: Weinong Wang Date: Tue, 27 Apr 2021 10:59:02 -0700 Subject: [PATCH] add oidc issuer to Azure auth provider doc (#1135) * add oidc issuer to Azure auth provider doc * updated versioned doc --- docs/docs/configuration/auth.md | 1 + docs/versioned_docs/version-7.1.x/configuration/auth.md | 1 + 2 files changed, 2 insertions(+) diff --git a/docs/docs/configuration/auth.md b/docs/docs/configuration/auth.md index 79a735c5..6a667da0 100644 --- a/docs/docs/configuration/auth.md +++ b/docs/docs/configuration/auth.md @@ -83,6 +83,7 @@ Note: The user is checked against the group members list on initial authenticati --provider=azure --client-id= --client-secret= + --oidc-issuer-url=https://sts.windows.net/{tenant-id}/ ``` Note: When using the Azure Auth provider with nginx and the cookie session store you may find the cookie is too large and doesn't get passed through correctly. Increasing the proxy_buffer_size in nginx or implementing the [redis session storage](sessions.md#redis-storage) should resolve this. diff --git a/docs/versioned_docs/version-7.1.x/configuration/auth.md b/docs/versioned_docs/version-7.1.x/configuration/auth.md index 79a735c5..6a667da0 100644 --- a/docs/versioned_docs/version-7.1.x/configuration/auth.md +++ b/docs/versioned_docs/version-7.1.x/configuration/auth.md @@ -83,6 +83,7 @@ Note: The user is checked against the group members list on initial authenticati --provider=azure --client-id= --client-secret= + --oidc-issuer-url=https://sts.windows.net/{tenant-id}/ ``` Note: When using the Azure Auth provider with nginx and the cookie session store you may find the cookie is too large and doesn't get passed through correctly. Increasing the proxy_buffer_size in nginx or implementing the [redis session storage](sessions.md#redis-storage) should resolve this.