Skip to content

Commit 5c1716f

Browse files
Update authentication documentation to remove tuple-style definition of OIDC-Metadata URI (#1290)
* Update authentication.md * One more fix --------- Co-authored-by: Debbie Matthews <[email protected]>
1 parent 9ee3827 commit 5c1716f

File tree

1 file changed

+8
-12
lines changed

1 file changed

+8
-12
lines changed

content/develop/concepts/connections/authentication.md

Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -84,9 +84,7 @@ redirect_uri = "http://localhost:8501/oauth2callback"
8484
cookie_secret = "xxx"
8585
client_id = "xxx"
8686
client_secret = "xxx"
87-
server_metadata_url = (
88-
"https://accounts.google.com/.well-known/openid-configuration"
89-
)
87+
server_metadata_url = "https://accounts.google.com/.well-known/openid-configuration"
9088
```
9189

9290
Make sure the port in `redirect_uri` matches the port you are using. The `cookie_secret` should be a strong, randomly generated secret. Both the `redirect_uri` and `cookie_secret` should have been entered into your client configuration on Google Cloud. You must copy the `client_id` and `client_secret` from Google Cloud after you create your client. For some identity providers, `server_metadata_url` may be unique to your client. However, for Google Cloud, a single URL is shared for OIDC clients.
@@ -133,16 +131,12 @@ cookie_secret = "xxx"
133131
[auth.google]
134132
client_id = "xxx"
135133
client_secret = "xxx"
136-
server_metadata_url = (
137-
"https://accounts.google.com/.well-known/openid-configuration"
138-
)
134+
server_metadata_url = "https://accounts.google.com/.well-known/openid-configuration"
139135

140136
[auth.microsoft]
141137
client_id = "xxx"
142138
client_secret = "xxx"
143-
server_metadata_url = (
144-
"https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration"
145-
)
139+
server_metadata_url = "https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration"
146140
```
147141

148142
Microsoft's server metadata URL varies slightly depending on how your client is scoped. Replace `{tenant}` with the appropriate value described in Microsoft's documentation for [OpenID configuration](https://learn.microsoft.com/en-us/entra/identity-platform/v2-protocols-oidc#find-your-apps-openid-configuration-document-uri).
@@ -192,8 +186,10 @@ cookie_secret = "xxx"
192186
[auth.auth0]
193187
client_id = "xxx"
194188
client_secret = "xxx"
195-
server_metadata_url = (
196-
"https://{account}.{region}.auth0.com/.well-known/openid-configuration"
197-
)
189+
server_metadata_url = "https://{account}.{region}.auth0.com/.well-known/openid-configuration"
198190
client_kwargs = { "prompt" = "login" }
199191
```
192+
193+
<Note>
194+
Hosted Code environments such as GitHub Codespaces have additional security controls in place preventing the login redirect to be handled properly.
195+
</Note>

0 commit comments

Comments
 (0)