Docs bug fixes (#2362)

* close warning block, syntax highlight

* Add title, grammar-fix link
This commit is contained in:
Alex Fornuto 2021-07-14 12:34:06 -05:00 committed by GitHub
parent 34b8af77d1
commit 86b56ffd37
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 8 additions and 3 deletions

View file

@ -24,6 +24,8 @@ In this guide we'll cover how to do the following for each identity provider:
You must configure an IdP **[Service Account]** to write policy against group membership, or any other data that does not uniquely identify an end-user.
:::
[client id]: ../../reference/readme.md#identity-provider-client-id
[client secret]: ../../reference/readme.md#identity-provider-client-secret
[environmental variables]: https://en.wikipedia.org/wiki/Environment_variable
@ -71,7 +73,7 @@ Now to implement this flow we have configured static dex client ```pom``` with p
```Note: I am using dex helm chart and in backend freeipa as a ldap server```
```
```yaml
connectors:
- config:
bindDN: uid=dex,cn=sysaccounts,cn=etc,dc=YOURDOMAIN,dc=dev
@ -119,11 +121,12 @@ connectors:
secret: pomerium
```
Below is configuration which supposed to be done in Pomerium
```Note: I am using Pomerium helm chart```
```
```yaml
config:
# routes under this wildcard domain are handled by pomerium
rootDomain: YOURDOMAIN.dev

View file

@ -8,7 +8,9 @@ description: >-
This guide covers how to use Pomerium with a local OIDC provider using [qlik/simple-oidc-provider].
---
You can use the same below configs for other supported [identity provider].
# Local OIDC Provider
You can use the same below configs for other supported [identity providers](/docs/identity-providers).
## Configure
### Docker-compose