...
In line 6 replace the placeholder <OIDC client secret>
with the client secret of the client.
Info |
---|
With Azure AD as OIDC provider it is necessary to add the path “https://graph.microsoft.com/oidc/userinfo“ to the property spa.cspConf.externalUrls. This will add the URL to the list of allowed CORS origins. |
Adopting to custom token claims
If necessary, you can adopt the deployment to use custom token claims. To do this, use the following properties in your values file:
Code Block |
---|
global
secrets:
oauth2:
tokenClaims:
id: ""
email: ""
name: ""
lastName: ""
givenName: "" |
Configure access rules
In a second step access rules and optional groups must be configured. To do so create a new text file “group-rules.yaml” and paste the following text into it:
...