GITBOOK-83: No subject

This commit is contained in:
Sam Dulam
2024-03-11 13:55:17 +00:00
committed by gitbook-bot
parent a39ed916ca
commit a9d9f4f6ab
5 changed files with 9 additions and 17 deletions

Binary file not shown.

After

Width:  |  Height:  |  Size: 94 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 94 KiB

After

Width:  |  Height:  |  Size: 10 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 10 KiB

After

Width:  |  Height:  |  Size: 109 KiB

View File

@@ -20,10 +20,16 @@ If you toggle **Automatic team membership** on, you can choose to automatically
In addition, you can enable the automatic assignment of admin rights to specified groups if desired.
{% hint style="info" %} When configuring Microsoft Entra (Azure AD) as the OAuth provider, you will need to [use the group's Object Id value](https://learn.microsoft.com/en-us/entra/fundamentals/how-to-manage-groups#edit-group-settings) for the claim value regex instead of the group name.{% endhint%}
<figure><img src="../../../.gitbook/assets/2.15-settings-authentication-oauth-team.png" alt=""><figcaption></figcaption></figure>
{% hint style="info" %}
When configuring Microsoft Entra (Azure AD) as the OAuth provider, you will need to use the [group's Object Id value](https://learn.microsoft.com/en-us/entra/fundamentals/how-to-manage-groups#edit-group-settings) for the claim value regex instead of the group name.
{% endhint %}
<figure><img src="../../../.gitbook/assets/image.png" alt=""><figcaption></figcaption></figure>
##
## OAuth providers
Portainer provides pre-configured OAuth provider options or you can set up your own custom OAuth provider. Each of the pre-configured providers can have their configuration overridden if you need to make changes to the Portainer defaults.
@@ -42,38 +48,24 @@ You can find these details using the following steps:
1. Log in to your Azure Portal as an administrator.
<figure><img src="../../../.gitbook/assets/authentication-oauth-ms-1.png" alt=""><figcaption></figcaption></figure>
2. Click on **Azure Active Directory** and then click on **Overview**. Your **Tenant ID** can be found in the right pane. Use this as the **Tenant ID** in Portainer.
<figure><img src="../../../.gitbook/assets/2.17-AzureOauth-AD.png" alt=""><figcaption></figcaption></figure>
3. Still in Azure Active Directory, click on **App Registrations** then click **New registration**.
Enter a friendly name for the Portainer instance. Choose appropriate option for Supported account types, Choose `Web` type for **Redirect URI** and enter the FQDN or IP address that your Portainer instance listens on `eg: https://portainer.example.com:9443`. Then click **Register**.
<figure><img src="../../../.gitbook/assets/2.17-AzureOauth-NewReg-S1.png" alt=""><figcaption></figcaption></figure>
<figure><img src="../../../.gitbook/assets/2.17-AzureOauth-NewReg.png" alt=""><figcaption></figcaption></figure>
4. After creating the Registration, the screen below is displayed. Use the provided **Application ID** in the respective field in Portainer.
<figure><img src="../../../.gitbook/assets/2.17-AzureOauth-NewReg-S2.png" alt=""><figcaption></figcaption></figure>
5. Click on **Certificates & secrets** then click **Client secrets**, Click on **New client secret**. Add **Description** and choose Expiry date, then Click **Add.**
The secret will then be generated for you. Use the Value as the **Application key** in the respective field in Portainer.
<figure><img src="../../../.gitbook/assets/2.17-AzureOauth-NewReg-S4.png" alt=""><figcaption></figcaption></figure>
<figure><img src="../../../.gitbook/assets/2.17-AzureOauth-NewReg-S3.png" alt=""><figcaption></figcaption></figure>

View File

@@ -8,7 +8,7 @@ To view, edit or create ingresses in your environment, select **Ingresses** from
All the Ingresses that a user has access to are listed on this page.&#x20;
<figure><img src="../../../.gitbook/assets/image (1).png" alt=""><figcaption></figcaption></figure>
<figure><img src="../../../.gitbook/assets/image (1) (1).png" alt=""><figcaption></figcaption></figure>
New Ingress objects can be created either manually or through a manifest: