You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: auth-oidc-proxy/README.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ In order to be able to authenticate using OIDC SSO, you'll need to choose and co
14
14
15
15
### Github.com OIDC SSO
16
16
17
-
Github.com provides a publicly available OIDC provider, that can be used to point to Code Engine applications, which you deployed in your IBM Cloud account. Use the following steps to configure an SSO app:
17
+
GitHub.com provides a publicly available OIDC provider, that can be used to point to Code Engine applications, which you deployed in your IBM Cloud account. Use the following steps to configure an SSO app:
18
18
19
19
* Create Github OIDC app through https://github.com/settings/developers
20
20
```
@@ -29,7 +29,7 @@ Github.com provides a publicly available OIDC provider, that can be used to poin
29
29
```
30
30
* Generate a random cookie secret that is used to encrypt the auth cookie value and add it to the `oidc.properties` file
To protect IBM's workforce, the SSO Provisioner provides the ability to configure an w3Id SSO. Note: This SSO provider can only be used by IBMers
48
+
To protect IBM-owned, internal applications, the w3Id SSO Provisioner provides the ability to configure an w3Id SSO. Note: This SSO provider can only be used by IBMers
49
49
50
50
* Create w3Id OIDC configuration through https://w3.ibm.com/security/sso-provisioner
51
51
```
@@ -60,7 +60,7 @@ To protect IBM's workforce, the SSO Provisioner provides the ability to configur
60
60
```
61
61
* Generate a random cookie secret that is used to encrypt the auth cookie value and add it to the `oidc.properties` file
0 commit comments