Skip to content

Commit

Permalink
Mention simple_oidc example
Browse files Browse the repository at this point in the history
  • Loading branch information
danielballan committed Jan 17, 2025
1 parent d9f03a9 commit 783c871
Showing 1 changed file with 5 additions and 1 deletion.
6 changes: 5 additions & 1 deletion docs/source/explanations/security.md
Original file line number Diff line number Diff line change
Expand Up @@ -257,7 +257,7 @@ authentication:
# The audience claim is checked by the OIDC Client (Tiled)
# It checks that the Authentication header that you are passed has not been intercepted
# And that elevated claims from other services do not apply here
audience: tiled # something unique to ensure received headers are for you
audience: tiled # something unique to ensure received headers are for you
client_id: tiled_client
client_secret: ${OIDC_CLIENT_SECRET} # referencing an environment variable
well_known_uri: example.com/.well-known/openid-configuration
Expand All @@ -266,6 +266,10 @@ authentication:
There are example configurations for ORCID and Google in the directory
`example_configs/` in the Tiled source repository.

You can also try it against a locally-runing dummy OIDC provider. See the
README and files under `example_configs/simple_oidc/` in the Tiled source
repository.

### Toy examples for testing and development

The ``DictionaryAuthenticator`` authenticates using usernames and passwords
Expand Down

0 comments on commit 783c871

Please sign in to comment.