DEX github 404 error (pick)

Updated stale external link in Sec. doc.

Signed-off-by: Ron Stone <ronald.stone@windriver.com>
Change-Id: If5d98e321b9d5a998d70a8bbe4a653102b9e1acf
This commit is contained in:
Ron Stone 2021-10-25 12:19:18 -04:00
parent c9d73b1239
commit 48b10b81e2

View File

@ -31,17 +31,17 @@ and uploaded by default.
key \(dex-key.pem file\) for the dex |OIDC| Identity Provider of key \(dex-key.pem file\) for the dex |OIDC| Identity Provider of
**oidc-auth-apps**. **oidc-auth-apps**.
This certificate *must* have the |prod|'s floating OAM IP Address in This certificate *must* have the |prod|'s floating |OAM| IP Address in
the |SAN| list. If you are planning on defining and using a DNS the |SAN| list. If you are planning on defining and using a DNS
name for the |prod|'s floating OAM IP Address, then this DNS name name for the |prod|'s floating |OAM| IP Address, then this DNS name
*must* also be in the |SAN| list. Refer to the documentation for *must* also be in the |SAN| list. Refer to the documentation for
the external |CA| that you are using, in order to create a signed the external |CA| that you are using, in order to create a signed
certificate and key. certificate and key.
If you are using an intermediate |CA| to sign the dex certificate, include If you are using an intermediate |CA| to sign the dex certificate, include
both the dex certificate \(signed by the intermediate |CA|\), and the both the dex certificate \(signed by the intermediate |CA|\), and the
intermediate |CA|'s certificate \(signed by the Root |CA|\) in that order, in intermediate |CA|'s certificate \(signed by the Root |CA|\) in that order,
**dex-cert.pem**. in **dex-cert.pem**.
- You must have the certificate of the |CA|\(**dex-ca.pem** file\) that - You must have the certificate of the |CA|\(**dex-ca.pem** file\) that
signed the above certificate for the dex |OIDC| Identity Provider of signed the above certificate for the dex |OIDC| Identity Provider of
@ -52,12 +52,11 @@ and uploaded by default.
**dex-cert.pem**, then the **dex-ca.pem** file should contain the root **dex-cert.pem**, then the **dex-ca.pem** file should contain the root
|CA|'s certificate. |CA|'s certificate.
If the signing |CA| \(**dex-ca.pem**\) is not a well-known trusted |CA|, you If the signing |CA| \(**dex-ca.pem**\) is not a well-known trusted |CA|,
must ensure the system trusts the |CA| by specifying it either during the you must ensure the system trusts the |CA| by specifying it either during
bootstrap phase of system installation, by specifying '**ssl\_ca\_cert: the bootstrap phase of system installation, by specifying '**ssl\_ca\_cert:
dex-ca.pem**' in the ansible bootstrap overrides **localhost.yml** file, dex-ca.pem**' in the ansible bootstrap overrides **localhost.yml** file, or
or by using the **system certificate-install -m ssl\_ca dex-ca.pem** by using the **system certificate-install -m ssl\_ca dex-ca.pem** command.
command.
.. rubric:: |proc| .. rubric:: |proc|
@ -100,20 +99,18 @@ and uploaded by default.
~(keystone_admin)]$ system helm-override-update oidc-auth-apps dex kube-system --values /home/sysadmin/dex-overrides.yaml ~(keystone_admin)]$ system helm-override-update oidc-auth-apps dex kube-system --values /home/sysadmin/dex-overrides.yaml
The dex-overrides.yaml file contains the desired dex helm chart overrides The dex-overrides.yaml file contains the desired dex helm chart overrides
\(that is, the LDAP connector configuration for the Active Directory \(that is, the |LDAP| connector configuration for the Active Directory
service, optional token expiry, and so on.\), and volume mounts for service, optional token expiry, and so on.\), and volume mounts for
providing access to the **wadcert** secret, described in this section. providing access to the **wadcert** secret, described in this section.
For the complete list of dex helm chart values supported, see `Dex Helm For the complete list of dex helm chart values supported, see `Dex Helm
Chart Values Chart Values
<https://github.com/helm/charts/blob/92b6289ae93816717a8453cfe62bad51cbdb <https://github.com/helm/charts/blob/92b6289ae93816717a8453cfe62bad51cbdb
8ad0/stable/dex/values.yaml>`__. For the complete list of parameters of 8ad0/stable/dex/values.yaml>`__. For the complete list of parameters of the
the dex LDAP connector configuration, see `Dex LDAP Connector dex |LDAP| connector configuration, see `Authentication Through LDAP
Configuration <https://dexidp.io/docs/connectors/ldap/>`__.
<https://github.com/dexidp/dex/blob/master/Documentation/connectors/ldap.
md>`__.
The example below configures a token expiry of ten hours, a single LDAP The example below configures a token expiry of ten hours, a single |LDAP|
connector to an Active Directory service using HTTPS \(LDAPS\) using the connector to an Active Directory service using HTTPS \(LDAPS\) using the
**wadcert** secret configured in this section, the required Active **wadcert** secret configured in this section, the required Active
Directory service login information \(that is, bindDN, and bindPW\), and Directory service login information \(that is, bindDN, and bindPW\), and