Merge pull request #1569 from bhageena/master
Fix spelling errors in docs
This commit is contained in:
commit
b7184be3dd
@ -89,7 +89,7 @@ connectors:
|
|||||||
# server provides access for anonymous auth.
|
# server provides access for anonymous auth.
|
||||||
# Please note that if the bind password contains a `$`, it has to be saved in an
|
# Please note that if the bind password contains a `$`, it has to be saved in an
|
||||||
# environment variable which should be given as the value to `bindPW`.
|
# environment variable which should be given as the value to `bindPW`.
|
||||||
bindDN: uid=seviceaccount,cn=users,dc=example,dc=com
|
bindDN: uid=serviceaccount,cn=users,dc=example,dc=com
|
||||||
bindPW: password
|
bindPW: password
|
||||||
|
|
||||||
# The attribute to display in the provided password prompt. If unset, will
|
# The attribute to display in the provided password prompt. If unset, will
|
||||||
|
@ -10,7 +10,7 @@ Prominent examples of OpenID Connect providers include Google Accounts, Salesfor
|
|||||||
|
|
||||||
This connector does not support the "groups" claim. Progress for this is tracked in [issue #1065][issue-1065].
|
This connector does not support the "groups" claim. Progress for this is tracked in [issue #1065][issue-1065].
|
||||||
|
|
||||||
When using refresh tokens, changes to the upstream claims aren't propegated to the id_token returned by dex. If a user's email changes, the "email" claim returned by dex won't change unless the user logs in again. Progress for this is tracked in [issue #863][issue-863].
|
When using refresh tokens, changes to the upstream claims aren't propagated to the id_token returned by dex. If a user's email changes, the "email" claim returned by dex won't change unless the user logs in again. Progress for this is tracked in [issue #863][issue-863].
|
||||||
|
|
||||||
## Configuration
|
## Configuration
|
||||||
|
|
||||||
@ -36,7 +36,7 @@ connectors:
|
|||||||
|
|
||||||
# Some providers require passing client_secret via POST parameters instead
|
# Some providers require passing client_secret via POST parameters instead
|
||||||
# of basic auth, despite the OAuth2 RFC discouraging it. Many of these
|
# of basic auth, despite the OAuth2 RFC discouraging it. Many of these
|
||||||
# cases are caught internally, but some may need to uncommented the
|
# cases are caught internally, but some may need to uncomment the
|
||||||
# following field.
|
# following field.
|
||||||
#
|
#
|
||||||
# basicAuthUnsupported: true
|
# basicAuthUnsupported: true
|
||||||
@ -56,7 +56,7 @@ connectors:
|
|||||||
# - email
|
# - email
|
||||||
# - groups
|
# - groups
|
||||||
|
|
||||||
# Some providers return claims without "email_verified", when they had no usage of emails verification in enrollement process
|
# Some providers return claims without "email_verified", when they had no usage of emails verification in enrollment process
|
||||||
# or if they are acting as a proxy for another IDP etc AWS Cognito with an upstream SAML IDP
|
# or if they are acting as a proxy for another IDP etc AWS Cognito with an upstream SAML IDP
|
||||||
# This can be overridden with the below option
|
# This can be overridden with the below option
|
||||||
# insecureSkipEmailVerified: true
|
# insecureSkipEmailVerified: true
|
||||||
|
@ -11,7 +11,7 @@ in with GitHub.
|
|||||||
|
|
||||||
## The problem
|
## The problem
|
||||||
|
|
||||||
When dex is federaing to an upstream identity provider (IDP), we want to ensure
|
When dex is federating to an upstream identity provider (IDP), we want to ensure
|
||||||
claims being passed onto clients remain fresh. This includes data such as Google
|
claims being passed onto clients remain fresh. This includes data such as Google
|
||||||
accounts display names, LDAP group membership, account deactivations. Changes to
|
accounts display names, LDAP group membership, account deactivations. Changes to
|
||||||
these on an upstream IDP should always be reflected in the claims dex passes to
|
these on an upstream IDP should always be reflected in the claims dex passes to
|
||||||
|
Reference in New Issue
Block a user