-
Notifications
You must be signed in to change notification settings - Fork 95
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Create assemblies for ext auth (#2938)
The assemblies are based on user stories for scenarios related to external authentication. * Create an assembly for ext auth with LDAP * Create an assembly for ext auth with FreeIPA * Create an assembly for ext auth with cross-forest AD trust * Create an assembly for ext auth with keycloak-general * Create an assembly for ext auth with keycloak-totp * Create an assembly for ext auth with ad * Create an assembly for keycloak-cac-cards * Create an assembly for managing IdM system lc * Remove obsolete list of ext auth scenarios It's obsolete now because it's included in the guide's ToC and the assembly intros. * Peer review feedback and cleanup Co-authored-by: Maximilian Kolb <[email protected]> Co-authored-by: Ewoud Kohl van Wijngaarden <[email protected]>
- Loading branch information
1 parent
4e3240d
commit 2135840
Showing
26 changed files
with
149 additions
and
171 deletions.
There are no files selected for viewing
7 changes: 7 additions & 0 deletions
7
..._configuring-a-freeipa-server-as-an-external-identity-provider-for-project.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,7 @@ | ||
include::modules/con_configuring-a-freeipa-server-as-an-external-identity-provider-for-project.adoc[] | ||
|
||
include::modules/con_using-freeipa.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-freeipa-authentication-on-server.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-host-based-authentication-control.adoc[leveloffset=+1] |
11 changes: 11 additions & 0 deletions
11
..._configuring-active-directory-as-an-external-identity-provider-for-project.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
include::modules/con_configuring-active-directory-as-an-external-identity-provider-for-project.adoc[] | ||
|
||
include::modules/con_gss-proxy.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_enrolling-server-with-the-ad-server.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-direct-ad-integration-with-gss-proxy.adoc[leveloffset=+1] | ||
|
||
include::modules/con_kerberos-configuration-in-web-browsers.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-the-freeipa-server-to-use-cross-forest-trust.adoc[leveloffset=+1] |
3 changes: 3 additions & 0 deletions
3
...h-cross-forest-kerberos-trust-as-an-external-identity-provider-for-project.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
include::modules/con_configuring-ad-integrated-with-freeipa-through-cross-forest-kerberos-trust-as-an-external-identity-provider-for-project.adoc[] | ||
|
||
include::modules/con_active-directory-with-cross-forest-trust.adoc[leveloffset=+1] |
13 changes: 13 additions & 0 deletions
13
...ly_configuring-an-ldap-server-as-an-external-identity-provider-for-project.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,13 @@ | ||
include::modules/con_configuring-an-ldap-server-as-an-external-identity-provider-for-project.adoc[] | ||
|
||
include::modules/con_using-ldap.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-tls-for-secure-ldap.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-project-to-use-ldap.adoc[leveloffset=+1] | ||
|
||
include::modules/ref_description-of-ldap-settings.adoc[leveloffset=+1] | ||
|
||
include::modules/ref_example-settings-for-ldap-connections.adoc[leveloffset=+1] | ||
|
||
include::modules/ref_examples-ldap-filters.adoc[leveloffset=+1] |
117 changes: 15 additions & 102 deletions
117
guides/common/assembly_configuring-external-authentication.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,128 +1,41 @@ | ||
include::modules/con_configuring-external-authentication.adoc[] | ||
|
||
include::modules/con_using-ldap.adoc[leveloffset=+1] | ||
include::assembly_configuring-an-ldap-server-as-an-external-identity-provider-for-project.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-tls-for-secure-ldap.adoc[leveloffset=+2] | ||
include::assembly_configuring-a-freeipa-server-as-an-external-identity-provider-for-project.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-project-to-use-ldap.adoc[leveloffset=+2] | ||
|
||
include::modules/ref_description-of-ldap-settings.adoc[leveloffset=+2] | ||
|
||
include::modules/ref_example-settings-for-ldap-connections.adoc[leveloffset=+2] | ||
|
||
include::modules/ref_examples-ldap-filters.adoc[leveloffset=+2] | ||
|
||
include::modules/con_using-freeipa.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-freeipa-authentication-on-server.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_configuring-host-based-authentication-control.adoc[leveloffset=+2] | ||
|
||
include::modules/con_using-active-directory.adoc[leveloffset=+1] | ||
|
||
include::modules/con_gss-proxy.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_enrolling-server-with-the-ad-server.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_configuring-direct-ad-integration-with-gss-proxy.adoc[leveloffset=+2] | ||
|
||
include::modules/con_kerberos-configuration-in-web-browsers.adoc[leveloffset=+2] | ||
|
||
include::modules/con_active-directory-with-cross-forest-trust.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_configuring-the-freeipa-server-to-use-cross-forest-trust.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_configuring-external-user-groups.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_refreshing-external-user-groups-for-ldap.adoc[leveloffset=+1] | ||
|
||
include::modules/con_refreshing-external-user-groups-for-freeipa-or-ad.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-the-hammer-cli-to-use-freeipa-user-authentication.adoc[leveloffset=+1] | ||
|
||
include::modules/con_external-authentication-for-provisioned-hosts.adoc[leveloffset=+1] | ||
include::assembly_configuring-ad-integrated-with-freeipa-through-cross-forest-kerberos-trust-as-an-external-identity-provider-for-project.adoc[leveloffset=+1] | ||
|
||
ifdef::context[:parent-context: {context}] | ||
:context: keycloak-general | ||
|
||
include::modules/con_configuring-project-with-keycloak-authentication.adoc[leveloffset=+1] | ||
|
||
include::modules/con_prerequisites-for-configuring-project-with-keycloak-authentication.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_registering-project-as-a-keycloak-client.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_configuring-the-project-client-in-keycloak.adoc[leveloffset=+2] | ||
|
||
include::modules/con_project-settings-for-keycloak-authentication.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_configuring-project-settings-for-keycloak-authentication-using-the-web-ui.adoc[leveloffset=+3] | ||
|
||
include::modules/proc_configuring-project-settings-for-keycloak-authentication-using-the-cli.adoc[leveloffset=+3] | ||
|
||
include::modules/proc_logging-in-to-the-project-web-ui-using-keycloak.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_logging-in-to-the-project-CLI-using-keycloak.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_configuring-group-mapping-for-keycloak-authentication.adoc[leveloffset=+2] | ||
include::assembly_configuring-keycloak-authentication-for-project.adoc[leveloffset=+1] | ||
ifdef::parent-context[:context: {parent-context}] | ||
ifndef::parent-context[:!context:] | ||
|
||
ifdef::context[:parent-context: {context}] | ||
:context: keycloak-totp | ||
|
||
include::modules/con_configuring-keycloak-authentication-with-totp.adoc[leveloffset=+1] | ||
|
||
include::modules/con_prerequisites-for-configuring-project-with-keycloak-authentication.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_registering-project-as-a-keycloak-client.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_configuring-the-project-client-in-keycloak.adoc[leveloffset=+2] | ||
|
||
include::modules/con_project-settings-for-keycloak-authentication.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_configuring-project-settings-for-keycloak-authentication-using-the-web-ui.adoc[leveloffset=+3] | ||
|
||
include::modules/proc_configuring-project-settings-for-keycloak-authentication-using-the-cli.adoc[leveloffset=+3] | ||
|
||
include::modules/proc_configuring-project-with-keycloak-for-totp-authentication.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_logging-in-to-the-project-web-ui-using-keycloak-totp-authentication.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_logging-in-to-the-project-CLI-using-keycloak.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_configuring-group-mapping-for-keycloak-authentication.adoc[leveloffset=+2] | ||
include::assembly_configuring-keycloak-authentication-with-totp-cards-for-project.adoc[leveloffset=+1] | ||
ifdef::parent-context[:context: {parent-context}] | ||
ifndef::parent-context[:!context:] | ||
|
||
ifndef::satellite,orcharhino[] | ||
ifdef::context[:parent-context: {context}] | ||
:context: keycloak-cac-cards | ||
include::assembly_configuring-keycloak-authentication-with-piv-cards-for-project.adoc[leveloffset=+1] | ||
ifdef::parent-context[:context: {parent-context}] | ||
ifndef::parent-context[:!context:] | ||
endif::[] | ||
|
||
include::modules/con_configuring-keycloak-authentication-with-piv-cards.adoc[leveloffset=+1] | ||
|
||
include::modules/con_prerequisites-for-configuring-project-with-keycloak-authentication.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_registering-project-as-a-keycloak-client.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_configuring-the-project-client-in-keycloak.adoc[leveloffset=+2] | ||
|
||
include::modules/con_project-settings-for-keycloak-authentication.adoc[leveloffset=+2] | ||
|
||
include::modules/proc_configuring-project-settings-for-keycloak-authentication-using-the-web-ui.adoc[leveloffset=+3] | ||
|
||
include::modules/proc_configuring-project-settings-for-keycloak-authentication-using-the-cli.adoc[leveloffset=+3] | ||
include::assembly_configuring-active-directory-as-an-external-identity-provider-for-project.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-keycloak-settings-for-authentication-with-cac-cards.adoc[leveloffset=+2] | ||
include::assembly_configuring-project-to-manage-the-lifecycle-of-a-host-registered-to-a-freeipa-realm.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-users-os-for-keycloak-authentication-with-cac-cards.adoc[leveloffset=+2] | ||
include::modules/proc_configuring-external-user-groups.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_logging-in-to-the-project-web-ui-using-keycloak-cac-cards.adoc[leveloffset=+2] | ||
include::modules/proc_refreshing-external-user-groups-for-ldap.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_logging-in-to-the-project-CLI-using-keycloak.adoc[leveloffset=+2] | ||
include::modules/con_refreshing-external-user-groups-for-freeipa-or-ad.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-group-mapping-for-keycloak-authentication.adoc[leveloffset=+2] | ||
ifdef::parent-context[:context: {parent-context}] | ||
ifndef::parent-context[:!context:] | ||
endif::[] | ||
include::modules/proc_configuring-the-hammer-cli-to-use-freeipa-user-authentication.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_disabling-keycloak-authentication.adoc[leveloffset=+1] |
17 changes: 17 additions & 0 deletions
17
guides/common/assembly_configuring-keycloak-authentication-for-project.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
include::modules/con_configuring-keycloak-authentication-for-project.adoc[] | ||
|
||
include::modules/con_prerequisites-for-configuring-project-with-keycloak-authentication.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_registering-project-as-a-keycloak-client.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-the-project-client-in-keycloak.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-project-settings-for-keycloak-authentication-using-the-web-ui.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-project-settings-for-keycloak-authentication-using-the-cli.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_logging-in-to-the-project-web-ui-using-keycloak.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_logging-in-to-the-project-CLI-using-keycloak.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-group-mapping-for-keycloak-authentication.adoc[leveloffset=+1] |
21 changes: 21 additions & 0 deletions
21
...on/assembly_configuring-keycloak-authentication-with-piv-cards-for-project.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
include::modules/con_configuring-keycloak-authentication-with-piv-cards-for-project.adoc[] | ||
|
||
include::modules/con_prerequisites-for-configuring-project-with-keycloak-authentication.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_registering-project-as-a-keycloak-client.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-the-project-client-in-keycloak.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-project-settings-for-keycloak-authentication-using-the-web-ui.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-project-settings-for-keycloak-authentication-using-the-cli.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-keycloak-settings-for-authentication-with-cac-cards.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-users-os-for-keycloak-authentication-with-cac-cards.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_logging-in-to-the-project-web-ui-using-keycloak-cac-cards.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_logging-in-to-the-project-CLI-using-keycloak.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-group-mapping-for-keycloak-authentication.adoc[leveloffset=+1] |
19 changes: 19 additions & 0 deletions
19
...n/assembly_configuring-keycloak-authentication-with-totp-cards-for-project.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
include::modules/con_configuring-keycloak-authentication-with-totp-cards-for-project.adoc[] | ||
|
||
include::modules/con_prerequisites-for-configuring-project-with-keycloak-authentication.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_registering-project-as-a-keycloak-client.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-the-project-client-in-keycloak.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-project-settings-for-keycloak-authentication-using-the-web-ui.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-project-settings-for-keycloak-authentication-using-the-cli.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-project-with-keycloak-for-totp-authentication.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_logging-in-to-the-project-web-ui-using-keycloak-totp-authentication.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_logging-in-to-the-project-CLI-using-keycloak.adoc[leveloffset=+1] | ||
|
||
include::modules/proc_configuring-group-mapping-for-keycloak-authentication.adoc[leveloffset=+1] |
1 change: 1 addition & 0 deletions
1
...ng-project-to-manage-the-lifecycle-of-a-host-registered-to-a-freeipa-realm.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
include::modules/con_configuring-project-to-manage-the-lifecycle-of-a-host-registered-to-a-freeipa-realm.adoc[] |
9 changes: 3 additions & 6 deletions
9
guides/common/modules/con_active-directory-with-cross-forest-trust.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,12 +1,9 @@ | ||
[id="Active_Directory_with_Cross_Forest_Trust_{context}"] | ||
= Active Directory with cross-forest trust | ||
|
||
Kerberos can create `cross-forest trust` that defines a relationship between two otherwise separate domain forests. | ||
A domain forest is a hierarchical structure of domains; both AD and {FreeIPA} constitute a forest. | ||
With a trust relationship enabled between AD and {FreeIPA}, users of AD can access Linux hosts and services using a single set of credentials. | ||
From the {Project} point of view, the configuration process is the same as integration with {FreeIPA} server without cross-forest trust configured. | ||
{ProjectServer} has to be enrolled in the IdM domain and integrated as described in xref:Using_FreeIPA_{context}[]. | ||
|
||
ifdef::satellite[] | ||
For more information on cross-forest trusts, see https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/planning_identity_management/planning-a-cross-forest-trust-between-idm-and-ad_planning-identity-management[Planning a cross-forest trust between IdM and AD] in _{RHEL} 9 guide_ or https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/planning_identity_management/planning-a-cross-forest-trust-between-idm-and-ad_planning-identity-management[Planning a cross-forest trust between IdM and AD] in _{RHEL} 8 guide_. | ||
endif::[] | ||
|
||
From the {Project} point of view, the configuration process is the same as integration with {FreeIPA} server without cross-forest trust configured. | ||
{ProjectServer} has to be enrolled in the IdM domain and integrated as described in xref:Using_FreeIPA_{context}[]. |
4 changes: 4 additions & 0 deletions
4
..._configuring-a-freeipa-server-as-an-external-identity-provider-for-project.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,4 @@ | ||
[id="configuring-a-freeipa-server-as-an-external-identity-provider-for-project_{context}"] | ||
= Configuring a {FreeIPA} server as an external identity provider for {Project} | ||
|
||
{FreeIPA} deals with the management of individual identities, their credentials, and privileges used in a networking environment. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
6 changes: 6 additions & 0 deletions
6
...h-cross-forest-kerberos-trust-as-an-external-identity-provider-for-project.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
[id="configuring-ad-integrated-with-freeipa-through-cross-forest-kerberos-trust-as-an-external-identity-provider-for-project_{context}"] | ||
= Configuring Active Directory integrated with {FreeIPA} through cross-forest Kerberos trust as an external identity provider for {Project} | ||
|
||
Kerberos can create `cross-forest trust` that defines a relationship between two otherwise separate domain forests. | ||
A domain forest is a hierarchical structure of domains; both AD and {FreeIPA} constitute a forest. | ||
With a trust relationship enabled between AD and {FreeIPA}, AD users can access Linux hosts and services using a single set of credentials. |
5 changes: 5 additions & 0 deletions
5
...on_configuring-an-ldap-server-as-an-external-identity-provider-for-project.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
[id="configuring-an-ldap-server-as-an-external-identity-provider-for-project_{context}"] | ||
= Configuring an LDAP server as an external identity provider for {Project} | ||
|
||
Lightweight Directory Access Protocol (LDAP) is a set of open protocols used to access centrally stored information over a network. | ||
With {Project}, you can manage LDAP entirely through the {ProjectWebUI}. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
4 changes: 4 additions & 0 deletions
4
guides/common/modules/con_configuring-keycloak-authentication-for-project.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,4 @@ | ||
[id="configuring-keycloak-authentication-for-project_{context}"] | ||
= Configuring {keycloak} authentication for {Project} | ||
|
||
Use this section to configure {Project} to use {Keycloak} as an OpenID provider for external authentication. |
4 changes: 4 additions & 0 deletions
4
...modules/con_configuring-keycloak-authentication-with-piv-cards-for-project.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,4 @@ | ||
[id="Configuring_Keycloak_Authentication_with_CAC_Cards_for_Project_{context}"] | ||
= Configuring {Keycloak} authentication with {PIV} cards for {Project} | ||
|
||
Use this section to configure {Project} to use {Keycloak} as an OpenID provider for external authentication with {PIV} cards. |
4 changes: 0 additions & 4 deletions
4
guides/common/modules/con_configuring-keycloak-authentication-with-piv-cards.adoc
This file was deleted.
Oops, something went wrong.
4 changes: 4 additions & 0 deletions
4
...odules/con_configuring-keycloak-authentication-with-totp-cards-for-project.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,4 @@ | ||
[id="configuring-keycloak-authentication-with-totp-cards-for-project_{context}"] | ||
= Configuring {keycloak} authentication with TOTP cards for {Project} | ||
|
||
Use this section to configure {Project} to use {Keycloak} as an OpenID provider for external authentication with TOTP cards. |
4 changes: 0 additions & 4 deletions
4
guides/common/modules/con_configuring-keycloak-authentication-with-totp.adoc
This file was deleted.
Oops, something went wrong.
Oops, something went wrong.