Docs bug fixes (#2362) (#2364)

* close warning block, syntax highlight

* Add title, grammar-fix link

Co-authored-by: Alex Fornuto <alex@fornuto.com>
This commit is contained in:
github-actions[bot] 2021-07-16 21:20:12 +00:00 committed by GitHub
parent cf4da92f5d
commit 96700d4d94
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 9 additions and 4 deletions

View file

@ -18,12 +18,14 @@ In this guide we'll cover how to do the following for each identity provider:
2. Generate a **[Client ID]** and **[Client Secret]**.
3. Generate a **[Service Account]** for additional IdP Data.
4. Configure Pomerium to use the **[Client ID]** and **[Client Secret]** keys.
5. Configure Pomerium to synchronize directory data from your identity provider (e.g. groups membership), by setting a service account.
5. Configure Pomerium to synchronize directory data from your identity provider (e.g. groups membership), by setting a service account.
:::warning
You must configure an IdP **[Service Account]** to write policy against group membership, or any other data that does not uniquely identify an end-user.
:::
[client id]: ../../reference/readme.md#identity-provider-client-id
[client secret]: ../../reference/readme.md#identity-provider-client-secret
[environmental variables]: https://en.wikipedia.org/wiki/Environment_variable
@ -71,7 +73,7 @@ Now to implement this flow we have configured static dex client ```pom``` with p
```Note: I am using dex helm chart and in backend freeipa as a ldap server```
```
```yaml
connectors:
- config:
bindDN: uid=dex,cn=sysaccounts,cn=etc,dc=YOURDOMAIN,dc=dev
@ -119,11 +121,12 @@ connectors:
secret: pomerium
```
Below is configuration which supposed to be done in Pomerium
```Note: I am using Pomerium helm chart```
```
```yaml
config:
# routes under this wildcard domain are handled by pomerium
rootDomain: YOURDOMAIN.dev

View file

@ -8,7 +8,9 @@ description: >-
This guide covers how to use Pomerium with a local OIDC provider using [qlik/simple-oidc-provider].
---
You can use the same below configs for other supported [identity provider].
# Local OIDC Provider
You can use the same below configs for other supported [identity providers](/docs/identity-providers).
## Configure
### Docker-compose