2022-07-12 18:27:30 +00:00
|
|
|
---
|
2022-07-13 07:22:42 +00:00
|
|
|
title: "Argo CD"
|
|
|
|
description: "Integrating Argo CD with the Authelia OpenID Connect Provider."
|
2022-07-12 18:27:30 +00:00
|
|
|
lead: ""
|
2022-09-01 02:24:47 +00:00
|
|
|
date: 2022-07-13T04:27:30+10:00
|
2022-07-12 18:27:30 +00:00
|
|
|
draft: false
|
|
|
|
images: []
|
|
|
|
menu:
|
|
|
|
integration:
|
|
|
|
parent: "openid-connect"
|
|
|
|
weight: 620
|
|
|
|
toc: true
|
|
|
|
community: true
|
|
|
|
---
|
|
|
|
|
|
|
|
## Tested Versions
|
|
|
|
|
|
|
|
* [Authelia]
|
|
|
|
* [v4.36.2](https://github.com/authelia/authelia/releases/tag/v4.36.2)
|
2022-07-13 07:22:42 +00:00
|
|
|
* [Argo CD]
|
2022-07-12 18:27:30 +00:00
|
|
|
* v2.4.5
|
|
|
|
|
|
|
|
## Before You Begin
|
|
|
|
|
2022-10-20 04:27:09 +00:00
|
|
|
### Common Notes
|
|
|
|
|
|
|
|
1. You are *__required__* to utilize a unique client id for every client.
|
|
|
|
2. The client id on this page is merely an example and you can theoretically use any alphanumeric string.
|
|
|
|
3. You *__should not__* use the client secret in this example, We *__strongly recommend__* reading the
|
|
|
|
[Generating Client Secrets] guide instead.
|
|
|
|
|
|
|
|
### Assumptions
|
2022-07-12 18:27:30 +00:00
|
|
|
|
|
|
|
This example makes the following assumptions:
|
|
|
|
|
|
|
|
* __Application Root URL:__ `https://argocd.example.com`
|
|
|
|
* __Authelia Root URL:__ `https://auth.example.com`
|
|
|
|
* __Client ID:__ `argocd`
|
|
|
|
* __Client Secret:__ `argocd_client_secret`
|
2022-07-13 07:22:42 +00:00
|
|
|
* __CLI Client ID:__ `argocd-cli`
|
2022-07-12 18:27:30 +00:00
|
|
|
|
|
|
|
## Configuration
|
|
|
|
|
|
|
|
### Application
|
|
|
|
|
2022-07-13 07:22:42 +00:00
|
|
|
To configure [Argo CD] to utilize Authelia as an [OpenID Connect] Provider use the following configuration:
|
2022-07-12 18:27:30 +00:00
|
|
|
|
|
|
|
```yaml
|
|
|
|
name: Authelia
|
|
|
|
issuer: https://auth.example.com
|
|
|
|
clientID: argocd
|
|
|
|
clientSecret: argocd_client_secret
|
2022-07-13 07:22:42 +00:00
|
|
|
cliClientID: argocd-cli
|
2022-07-12 18:27:30 +00:00
|
|
|
requestedScopes:
|
|
|
|
- openid
|
|
|
|
- profile
|
|
|
|
- email
|
|
|
|
- groups
|
|
|
|
```
|
|
|
|
|
|
|
|
### Authelia
|
|
|
|
|
|
|
|
The following YAML configuration is an example __Authelia__
|
2022-07-13 07:22:42 +00:00
|
|
|
[client configuration](../../../configuration/identity-providers/open-id-connect.md#clients) for use with [Argo CD]
|
2022-07-12 18:27:30 +00:00
|
|
|
which will operate with the above example:
|
|
|
|
|
|
|
|
```yaml
|
|
|
|
- id: argocd
|
2022-07-13 07:22:42 +00:00
|
|
|
description: Argo CD
|
2022-10-20 03:21:45 +00:00
|
|
|
secret: '$plaintext$argocd_client_secret'
|
2022-08-26 03:26:58 +00:00
|
|
|
public: false
|
|
|
|
authorization_policy: two_factor
|
2022-07-12 18:27:30 +00:00
|
|
|
redirect_uris:
|
|
|
|
- https://argocd.example.com/auth/callback
|
|
|
|
scopes:
|
|
|
|
- openid
|
|
|
|
- groups
|
|
|
|
- email
|
|
|
|
- profile
|
|
|
|
userinfo_signing_algorithm: none
|
2022-07-12 18:37:23 +00:00
|
|
|
- id: argocd-cli
|
2022-07-13 07:22:42 +00:00
|
|
|
description: Argo CD (CLI)
|
2022-07-12 18:27:30 +00:00
|
|
|
public: true
|
2022-08-26 03:26:58 +00:00
|
|
|
authorization_policy: two_factor
|
2022-07-12 18:27:30 +00:00
|
|
|
redirect_uris:
|
|
|
|
- http://localhost:8085/auth/callback
|
|
|
|
scopes:
|
|
|
|
- openid
|
|
|
|
- groups
|
|
|
|
- email
|
|
|
|
- profile
|
2022-07-14 00:13:18 +00:00
|
|
|
- offline_access
|
2022-07-12 18:27:30 +00:00
|
|
|
userinfo_signing_algorithm: none
|
|
|
|
```
|
|
|
|
|
|
|
|
## See Also
|
|
|
|
|
2022-07-13 07:22:42 +00:00
|
|
|
* [Argo CD OpenID Connect Documentation](https://argo-cd.readthedocs.io/en/stable/operator-manual/user-management/#existing-oidc-provider)
|
2022-07-12 18:27:30 +00:00
|
|
|
|
|
|
|
[Authelia]: https://www.authelia.com
|
2022-07-13 07:22:42 +00:00
|
|
|
[Argo CD]: https://argo-cd.readthedocs.io/en/stable/
|
2022-07-12 18:27:30 +00:00
|
|
|
[OpenID Connect]: ../../openid-connect/introduction.md
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|