You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> We recommend requiring and auditing MFA usage for all users in your GitHub
54
78
> organizations. This can be enforced from the organization settings page in the
55
79
> "Authentication security" sidebar tab.
56
80
57
-
## GitLab
81
+
## OpenID Connect
58
82
59
-
### Step 1: Configure the OAuth application in your GitLab instance
83
+
The following steps through how to integrate any OpenID Connect provider (Okta, Active Directory, etc.) to Coder.
60
84
61
-
First, [register a GitLab OAuth application](https://docs.gitlab.com/ee/integration/oauth_provider.html). GitLab will ask you for the following parameter:
85
+
### Step 1: Set Redirect URI with your OIDC provider
86
+
87
+
Your OIDC provider will ask you for the following parameter:
62
88
63
89
-**Redirect URI**: Set to `https://coder.domain.com/api/v2/users/oidc/callback`
64
90
65
-
### Step 2: Configure Coder with the Gitlab OpenID Connect credentials
91
+
### Step 2: Configure Coder with the OpenID Connect credentials
66
92
67
93
Navigate to your Coder host and run the following command to start up the Coder
68
94
server:
69
95
70
96
```console
71
-
coder server --oidc-issuer-url="https://gitlab.com" --oidc-email-domain="your-domain-1,your-domain-2" --oidc-client-id="533...des" --oidc-client-secret="G0CSP...7qSM"
97
+
coder server --oidc-issuer-url="https://issuer.corp.com" --oidc-email-domain="your-domain-1,your-domain-2" --oidc-client-id="533...des" --oidc-client-secret="G0CSP...7qSM"
72
98
```
73
99
74
-
Alternatively, if you are running Coder as a system service, you can achieve the
100
+
If you are running Coder as a system service, you can achieve the
75
101
same result as the command above by adding the following environment variables
If deploying Coder via Helm, you can set the above environment variables in the
114
+
`values.yaml` file as such:
115
+
116
+
```yaml
117
+
coder:
118
+
env:
119
+
- name: CODER_OIDC_ISSUER_URL
120
+
value: "https://issuer.corp.com"
121
+
- name: CODER_OIDC_EMAIL_DOMAIN
122
+
value: "your-domain-1,your-domain-2"
123
+
- name: CODER_OIDC_CLIENT_ID
124
+
value: "533...des"
125
+
- name: CODER_OIDC_CLIENT_SECRET
126
+
value: "G0CSP...7qSM"
99
127
```
100
128
101
-
If you are using a self-hosted GitLab instance, replace `gitlab.com` in the above URL
102
-
with your internal domain. The same will apply for the `OIDC_ISSUER_URL` variable.
103
-
104
-
## OpenID Connect with Google
105
-
106
-
### Step 1: Configure the OAuth application on Google Cloud
107
-
108
-
First, [register a Google OAuth application](https://support.google.com/cloud/answer/6158849?hl=en). Google will ask you for the following Coder parameters:
109
-
110
-
-**Authorized JavaScript origins**: Set to your Coder domain (e.g. `https://coder.domain.com`)
111
-
-**Redirect URIs**: Set to `https://coder.domain.com/api/v2/users/oidc/callback`
112
-
113
-
### Step 2: Configure Coder with the Google OpenID Connect credentials
114
-
115
-
Navigate to your Coder host and run the following command to start up the Coder
116
-
server:
129
+
To upgrade Coder, run:
117
130
118
131
```console
119
-
coder server --oidc-issuer-url="https://accounts.google.com" --oidc-email-domain="your-domain-1,your-domain-2" --oidc-client-id="533...ent.com" --oidc-client-secret="G0CSP...7qSM"
0 commit comments