From 69636ae0c7441b22080c478694f661358a4c4294 Mon Sep 17 00:00:00 2001 From: richvdh Date: Thu, 19 May 2022 09:28:49 +0000 Subject: deploy: 5675cebfaa511b6a93db15dd3db3b7f27ce0677a --- develop/openid.html | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) (limited to 'develop/openid.html') diff --git a/develop/openid.html b/develop/openid.html index 096fba0525..ff0d81cf63 100644 --- a/develop/openid.html +++ b/develop/openid.html @@ -411,7 +411,7 @@ can be used to retrieve information on the authenticated user. As the Synapse login mechanism needs an attribute to uniquely identify users, and that endpoint does not return a sub property, an alternative subject_claim has to be set.

    -
  1. Create a new OAuth application: https://github.com/settings/applications/new.
  2. +
  3. Create a new OAuth application: https://github.com/settings/applications/new.
  4. Set the callback URL to [synapse public baseurl]/_synapse/client/oidc/callback.

Synapse config:

@@ -436,8 +436,8 @@ does not return a sub property, an alternative subject_claim<

Google

Google is an OpenID certified authentication and authorisation provider.

    -
  1. Set up a project in the Google API Console (see -https://developers.google.com/identity/protocols/oauth2/openid-connect#appsetup).
  2. +
  3. Set up a project in the Google API Console (see +documentation).
  4. Add an "OAuth Client ID" for a Web Application under "Credentials".
  5. Copy the Client ID and Client Secret, and add the following to your synapse config:
    oidc_providers:
    @@ -596,8 +596,8 @@ private key with "SiWA" enabled.

  6. Team ID: a 10-character ID associated with your developer account.
  7. Key ID: the 10-character identifier for the key.
  8. -

    https://help.apple.com/developer-account/?lang=en#/dev77c875b7e has more -documentation on setting up SiWA.

    +

    Apple's developer documentation +has more information on setting up SiWA.

    The synapse config will look like this:

      - idp_id: apple
         idp_name: Apple
    @@ -624,10 +624,10 @@ needed to add OAuth2 capabilities to your Django projects. It supports
     OpenID Connect too.

    Configuration on Django's side:

      -
    1. Add an application: https://example.com/admin/oauth2_provider/application/add/ and choose parameters like this:
    2. +
    3. Add an application: https://example.com/admin/oauth2_provider/application/add/ and choose parameters like this:
      -
    • Redirect uris: https://synapse.example.com/_synapse/client/oidc/callback
    • +
    • Redirect uris: https://synapse.example.com/_synapse/client/oidc/callback
    • Client type: Confidential
    • Authorization grant type: Authorization code
    • Algorithm: HMAC with SHA-2 256
    • -- cgit 1.4.1