File tree Expand file tree Collapse file tree 1 file changed +6
-6
lines changed Expand file tree Collapse file tree 1 file changed +6
-6
lines changed Original file line number Diff line number Diff line change @@ -21,7 +21,7 @@ Users will still be able to create a personal password which will be used to mak
21
21
- Allow to synchronize OIDC roles / groups with cryptpad teams
22
22
- Additional SSO protocols
23
23
24
- If you are interested by these extra features and wishing to sponsor them, contact XWiki SAS at sales@cryptpad.fr .
24
+ If you are interested by these extra features and wishing to sponsor them, contact XWiki SAS at sales@cryptpad.org
25
25
26
26
## Manual installation
27
27
@@ -35,20 +35,20 @@ git clone https://github.com/cryptpad/sso/
35
35
Go to the cryptpad/config directory on your server
36
36
37
37
```
38
- cd cryptpad /config
38
+ cd ../.. /config
39
39
cp sso.example.js sso.js
40
40
```
41
41
42
- and edit the sso.js to set the credentials to your SSO server:
42
+ and edit the ` sso.js ` to set the credentials to your SSO server:
43
43
44
- ## Create an OpenID Connect COnfiguration on your authentication server
44
+ ## Create an OpenID Connect Configuration on your authentication server
45
45
46
46
The SSO module has been succesfully tested using KeyCloak and Univention UCS using default settings.
47
47
When setting up the client credentials on your OpenIDC Connect server the following redirect URI needs to be set
48
48
49
- https://<yourdomain >/ssoauth
49
+ ` https://<yourdomain>/ssoauth `
50
50
51
- (In case you are still using a local test http server the URL should be http://<yourdomain >:<yourport >/ssoauth)
51
+ (In case you are still using a local test http server the URL should be ` http://<yourdomain>:<yourport>/ssoauth ` )
52
52
53
53
### sso.js sample configurations
54
54
You can’t perform that action at this time.
0 commit comments