mirror of
https://github.com/opencloud-eu/opencloud.git
synced 2025-12-30 17:00:57 -06:00
ocis_keycloak: Move to role assignment via oidc claim (#5882)
Use the new PROXY_ROLE_ASSIGNMENT_DRIVER "oidc". This also means we can now run with OCIS_ADMIN_USER_ID being empty. So that no admin user will be created on startup and no default role assignment will happen. By setting GRAPH_ASSIGN_DEFAULT_USER_ROLE to "false", we make sure to not create the default "user" role assignment when auto provisioning a user.
This commit is contained in:
@@ -60,6 +60,7 @@ services:
|
||||
environment:
|
||||
# Keycloak IDP specific configuration
|
||||
PROXY_AUTOPROVISION_ACCOUNTS: "true"
|
||||
PROXY_ROLE_ASSIGNMENT_DRIVER: "oidc"
|
||||
OCIS_OIDC_ISSUER: https://${KEYCLOAK_DOMAIN:-keycloak.owncloud.test}/realms/${KEYCLOAK_REALM:-oCIS}
|
||||
PROXY_OIDC_REWRITE_WELLKNOWN: "true"
|
||||
WEB_OIDC_CLIENT_ID: ${OCIS_OIDC_CLIENT_ID:-web}
|
||||
@@ -70,6 +71,8 @@ services:
|
||||
PROXY_TLS: "false" # do not use SSL between Traefik and oCIS
|
||||
# INSECURE: needed if oCIS / Traefik is using self generated certificates
|
||||
OCIS_INSECURE: "${INSECURE:-false}"
|
||||
OCIS_ADMIN_USER_ID: ""
|
||||
GRAPH_ASSIGN_DEFAULT_USER_ROLE: "false"
|
||||
volumes:
|
||||
- ocis-config:/etc/ocis
|
||||
- ocis-data:/var/lib/ocis
|
||||
|
||||
Reference in New Issue
Block a user