vault: revert to confidential client, Web UI only (no CLI)
All checks were successful
Run nix flake check / flake-check (push) Successful in 2m8s
All checks were successful
Run nix flake check / flake-check (push) Successful in 2m8s
This commit is contained in:
@@ -1,10 +1,11 @@
|
||||
# OIDC authentication backend for Kanidm integration
|
||||
# Using a public client (no secret) to support CLI localhost redirects
|
||||
# Web UI only - CLI localhost redirects not supported with confidential clients
|
||||
resource "vault_jwt_auth_backend" "oidc" {
|
||||
path = "oidc"
|
||||
type = "oidc"
|
||||
oidc_discovery_url = "https://auth.home.2rjus.net/oauth2/openid/openbao"
|
||||
oidc_client_id = "openbao"
|
||||
oidc_client_secret = random_password.auto_secrets["services/openbao/oauth2-client-secret"].result
|
||||
default_role = "default"
|
||||
|
||||
tune {
|
||||
@@ -27,7 +28,6 @@ resource "vault_jwt_auth_backend_role" "admin" {
|
||||
role_type = "oidc"
|
||||
|
||||
allowed_redirect_uris = [
|
||||
"http://localhost:8250/oidc/callback",
|
||||
"https://vault.home.2rjus.net:8200/ui/vault/auth/oidc/oidc/callback",
|
||||
]
|
||||
}
|
||||
@@ -43,7 +43,6 @@ resource "vault_jwt_auth_backend_role" "default" {
|
||||
role_type = "oidc"
|
||||
|
||||
allowed_redirect_uris = [
|
||||
"http://localhost:8250/oidc/callback",
|
||||
"https://vault.home.2rjus.net:8200/ui/vault/auth/oidc/oidc/callback",
|
||||
]
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user