From 566ebc8b1b82b1ebd844096732fdd03d4cbdf12b Mon Sep 17 00:00:00 2001 From: Cian Johnston Date: Fri, 11 Mar 2022 10:13:46 +0000 Subject: [PATCH] chore: update documentation for admin login when built-in auth disabled --- admin/access-control/manage.md | 20 ++++++++------------ setup/kubernetes/aws.md | 2 +- 2 files changed, 9 insertions(+), 13 deletions(-) diff --git a/admin/access-control/manage.md b/admin/access-control/manage.md index 0a134d9e3..7b57101e4 100644 --- a/admin/access-control/manage.md +++ b/admin/access-control/manage.md @@ -22,9 +22,9 @@ domain name for the OIDC token callback; use `https://coder.my-company.com/oidc/callback`. Once you've registered a Coder application with your OIDC provider, you'll need -to return to Coder and complete the setup process. Under **Admin** > **Manage** > -**Authentication**, ensure that you've selected **OpenID Connect** as the -authentication type. Then, provide the following parameters: +to return to Coder and complete the setup process. Under **Admin** > +**Manage** > **Authentication**, ensure that you've selected **OpenID Connect** +as the authentication type. Then, provide the following parameters: - **Client ID**: The client ID for the Coder application you registered with the OIDC provider @@ -43,9 +43,9 @@ you: tokens from `https:///api/v0/users/me/oidc-access-token` - **Additional Scopes:** Specify any scopes (beyond the default) that you would like Coder to request from the authentication provider. By default, Coder -requests the scopes `openid`, `email`, and `profile`. Consult your -authentication provider's documentation for information on which scopes they -support. + requests the scopes `openid`, `email`, and `profile`. Consult your + authentication provider's documentation for information on which scopes they + support. - **Disable built-in authentication:** Choose whether Coder removes the ability to log in with an email/password option when you've enabled OIDC authentication @@ -62,9 +62,5 @@ To do so, navigate to **Manage** > **Admin** > **Authentication**. Then, toggle **Disable built-in authentication** to **On** and click **Save preferences**. [Site managers](users/user-roles#site-manager-permissions) can still use -built-in authentication. To view this option on the login page, add the -following query parameter to the URL you use to access your Coder deployment: - -```text -/login?showAllAuthenticationTypes=1 -``` +built-in authentication. The **Admin Login** option will be visible on the login +page if built-in authentication is disabled. diff --git a/setup/kubernetes/aws.md b/setup/kubernetes/aws.md index eebefba5a..e494de306 100644 --- a/setup/kubernetes/aws.md +++ b/setup/kubernetes/aws.md @@ -184,7 +184,7 @@ as a workspace deployment option, you'll need to # ami: instanceType: minSize: 1 - mazSize: 2 + maxSize: 2 desiredCapacity: 1 # Uncomment "overrideBootstrapCommand" if you are using a custom AMI # overrideBootstrapCommand: |