add oidc issuer to Azure auth provider doc (#1135)
* add oidc issuer to Azure auth provider doc * updated versioned doc
This commit is contained in:
		
							parent
							
								
									d6de11aa98
								
							
						
					
					
						commit
						f9de0e840c
					
				|  | @ -83,6 +83,7 @@ Note: The user is checked against the group members list on initial authenticati | ||||||
|    --provider=azure |    --provider=azure | ||||||
|    --client-id=<application ID from step 3> |    --client-id=<application ID from step 3> | ||||||
|    --client-secret=<value from step 6> |    --client-secret=<value from step 6> | ||||||
|  |    --oidc-issuer-url=https://sts.windows.net/{tenant-id}/ | ||||||
| ``` | ``` | ||||||
| 
 | 
 | ||||||
| Note: When using the Azure Auth provider with nginx and the cookie session store you may find the cookie is too large and doesn't get passed through correctly. Increasing the proxy_buffer_size in nginx or implementing the [redis session storage](sessions.md#redis-storage) should resolve this. | Note: When using the Azure Auth provider with nginx and the cookie session store you may find the cookie is too large and doesn't get passed through correctly. Increasing the proxy_buffer_size in nginx or implementing the [redis session storage](sessions.md#redis-storage) should resolve this. | ||||||
|  |  | ||||||
|  | @ -83,6 +83,7 @@ Note: The user is checked against the group members list on initial authenticati | ||||||
|    --provider=azure |    --provider=azure | ||||||
|    --client-id=<application ID from step 3> |    --client-id=<application ID from step 3> | ||||||
|    --client-secret=<value from step 6> |    --client-secret=<value from step 6> | ||||||
|  |    --oidc-issuer-url=https://sts.windows.net/{tenant-id}/ | ||||||
| ``` | ``` | ||||||
| 
 | 
 | ||||||
| Note: When using the Azure Auth provider with nginx and the cookie session store you may find the cookie is too large and doesn't get passed through correctly. Increasing the proxy_buffer_size in nginx or implementing the [redis session storage](sessions.md#redis-storage) should resolve this. | Note: When using the Azure Auth provider with nginx and the cookie session store you may find the cookie is too large and doesn't get passed through correctly. Increasing the proxy_buffer_size in nginx or implementing the [redis session storage](sessions.md#redis-storage) should resolve this. | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue