Skip to content

Commit

Permalink
docs
Browse files Browse the repository at this point in the history
  • Loading branch information
case0sh committed Aug 19, 2024
1 parent e923857 commit 233272d
Show file tree
Hide file tree
Showing 2 changed files with 21 additions and 20 deletions.
24 changes: 12 additions & 12 deletions charts/ocis/docs/values-desc-table.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -624,12 +624,6 @@ a| [subs=-attributes]
a| [subs=-attributes]
`true`
| Writeable configures if oCIS is allowed to write to the LDAP server, to eg. create or edit users.
| features.externalUserManagement.oidc.WebClientScope
a| [subs=-attributes]
+string+
a| [subs=-attributes]
`"openid profile email"`
| OIDC scopes to request during authentication to authorize access to user details. Defaults to ‘openid profile email’. Values are separated by blank. More example values but not limited to are ‘address’ or ‘phone’ etc.
| features.externalUserManagement.oidc.accessTokenVerifyMethod
a| [subs=-attributes]
+string+
Expand Down Expand Up @@ -684,12 +678,6 @@ a| [subs=-attributes]
a| [subs=-attributes]
`"userid"`
| Attribute mapping of for the userIDClaim. Set to `userid` if the claim specified in `...oidc.userIDClaim` holds the value of the ldap user attribute specified in `...ldap.user.schema.id`. Set to `mail` if the claim specified in `...oidc.userIDClaim` holds the value of the ldap user attribute specified in `...ldap.user.schema.mail`. Set to `username` if the claim specified in `...oidc.userIDClaim` holds the value of the ldap user attribute specified in `...ldap.user.schema.userName`.
| features.externalUserManagement.oidc.webClientID
a| [subs=-attributes]
+string+
a| [subs=-attributes]
`"web"`
| Specify the client ID which the web frontend will use
| features.gdprReport.integrations.keycloak.basePath
a| [subs=-attributes]
+string+
Expand Down Expand Up @@ -4506,6 +4494,18 @@ a| [subs=-attributes]
a| [subs=-attributes]
`""`
| URI where the feedback link points. Uses the ownCloud default href if empty.
| services.web.config.oidc.webClientID
a| [subs=-attributes]
+string+
a| [subs=-attributes]
`"web"`
| Specify the client ID which the web frontend will use
| services.web.config.oidc.webClientScope
a| [subs=-attributes]
+string+
a| [subs=-attributes]
`"openid profile email"`
| OIDC scopes to request during authentication to authorize access to user details. Defaults to ‘openid profile email’. Values are separated by blank. More example values but not limited to are ‘address’ or ‘phone’ etc.
| services.web.config.previewFileMimeTypes
a| [subs=-attributes]
+list+
Expand Down
17 changes: 9 additions & 8 deletions charts/ocis/docs/values.adoc.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -406,10 +406,6 @@ features:
# -- Link to the OIDC provider's user accessible account editing page. This will be shown to the user on the personal account page.
# When using Keycloak with the a realm named "ocis" this could point to eg. https://keycloak.owncloud.test/realms/ocis/account/
editAccountLink: ""
# -- OIDC scopes to request during authentication to authorize access to user details. Defaults to ‘openid profile email’. Values are separated by blank. More example values but not limited to are ‘address’ or ‘phone’ etc.
WebClientScope: "openid profile email"
# -- Specify the client ID which the web frontend will use
webClientID: web
# -- Claim to take an unique user identifier from. It will be used to look up the user on the LDAP server.
userIDClaim: ocis.user.uuid
# -- Attribute mapping of for the userIDClaim.
Expand Down Expand Up @@ -2269,10 +2265,15 @@ services:
# -- Name of the theme you provide via `configRefs.webThemeConfigRef` and `configRefs.webThemeAssetsConfigRef`.
# If you change this when providing a custom theme, you must also change `theme.path`.
themeNameConfigRefs: "owncloud"
# URI where to redirect the user after a logout was performed. Defaults to the URI of the login page.
postLogoutRedirectURI: ""
# Specifies the target url valid for the logged out / access denied page.
loginURL:
oidc:
# -- OIDC scopes to request during authentication to authorize access to user details. Defaults to ‘openid profile email’. Values are separated by blank. More example values but not limited to are ‘address’ or ‘phone’ etc.
webClientScope: "openid profile email"
# -- Specify the client ID which the web frontend will use
webClientID: web
# URI where to redirect the user after a logout was performed. Defaults to the URI of the login page.
postLogoutRedirectURI: ""
# Specifies the target url valid for the logged out / access denied page.
loginURL:
# Defines whether one ore more filters must be set in order to list users in the Web admin settings.
userListRequiresFilter: false
# Embed mode settings
Expand Down

0 comments on commit 233272d

Please # to comment.