docs: oidc grafana env update (#3847)

Co-authored-by: James Elliott <james-d-elliott@users.noreply.github.com>
pull/3902/head
boomam 2022-08-25 21:42:12 -04:00 committed by GitHub
parent 657463a3e6
commit 50c12f573c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 21 additions and 1 deletions

View File

@ -37,8 +37,9 @@ This example makes the following assumptions:
### Application
To configure [Grafana] to utilize Authelia as an [OpenID Connect] Provider:
To configure [Grafana] to utilize Authelia as an [OpenID Connect] Provider, you either need to edit the config file, or specify overrides in the containers environment variables.
#### Method 1: Configuration Files
1. Add the following Generic OAuth configuration to the [Grafana] configuration:
```ruby
@ -61,6 +62,25 @@ name_attribute_path = name
use_pkce = true
```
#### Method 2: Container Environment Variables
**GF_AUTH_GENERIC_OAUTH_NAME=**`Authelia`
**GF_AUTH_GENERIC_OAUTH_ENABLED=**`true`
**GF_AUTH_GENERIC_OAUTH_ALLOW_SIGN_UP=**`true`
**GF_AUTH_GENERIC_OAUTH_CLIENT_ID=**`grafana`
**GF_AUTH_GENERIC_OAUTH_CLIENT_SECRET=**`grafana_client_secret`
**GF_AUTH_GENERIC_OAUTH_SCOPES=**`openid profile email groups`
**GF_AUTH_GENERIC_OAUTH_EMAIL_ATTRIBUTE_NAME=**`email`
**GF_AUTH_GENERIC_OAUTH_AUTH_URL=**`https://auth.example.com/api/oidc/authorization`
**GF_AUTH_GENERIC_OAUTH_TOKEN_URL=**`https://auth.example.com/api/oidc/token`
**GF_AUTH_GENERIC_OAUTH_API_URL=**`https://auth.example.com/api/oidc/userinfo`
**GF_AUTH_GENERIC_OAUTH_TLS_SKIP_VERIFY_INSECURE=**`true`
**GF_AUTH_GENERIC_OAUTH_EMPTY_SCOPES=**`false`
**GF_AUTH_GENERIC_OAUTH_ICON=**`signin`
**GF_AUTH_GENERIC_OAUTH_LOGIN_ATTRIBUTE_PATH=**`preferred_username`
**GF_AUTH_GENERIC_OAUTH_GROUPS_ATTRIBUTE_PATH=**`groups`
**GF_AUTH_GENERIC_OAUTH_NAME_ATTRIBUTE_PATH=**`name`
**GF_AUTH_GENERIC_OAUTH_USE_PKCE=**`true`
### Authelia
The following YAML configuration is an example __Authelia__