You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+5-6Lines changed: 5 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -213,6 +213,7 @@ OPENID_CONFIG=`{
213
213
SCOPES: "openid profile",
214
214
TOLERANCE: // optional
215
215
RESOURCE: // optional
216
+
PROVIDER: // required only for group-based permissions
216
217
}`
217
218
```
218
219
@@ -343,7 +344,8 @@ If [logging in with OpenID](#openid-connect) via a supported provider, then user
343
344
344
345
For all providers, see the following. Then, see additional instructions for your provider below.
345
346
346
-
1. Add `PROVIDER: "<provider-name-here>"` to your `.env.local` (you will enter the actual provider name later). Also, add `groups` to the `OPENID_CONFIG.SCOPES` field in your `.env.local` file:
347
+
1. Add `PROVIDER: "<provider-name-here>"` to your `.env.local`. Also, add `groups` to the `OPENID_CONFIG.SCOPES` field in your `.env.local` file:
348
+
347
349
```env
348
350
OPENID_CONFIG=`{
349
351
// rest of OPENID_CONFIG here
@@ -358,8 +360,6 @@ OPENID_CONFIG=`{
358
360
> [!WARNING]
359
361
> The first model in your `.env.local` file is considered the "default" model and should be available to all users, so we strongly recommend against setting `allowed_groups` for this model.
360
362
361
-
> Note that during development, it is common to have `APP_BASE=""` in your `.env.local` - however, due to the cookies created by using a provider, this value should not be empty (e.g. setting `APP_BASE="/"` in `.env.local` would work).
362
-
363
363
#### Provider: Microsoft Entra
364
364
365
365
In order to enable use of [Microsoft Entra Security Groups](https://learn.microsoft.com/en-us/entra/fundamentals/concept-learn-about-groups) to show/hide models, do the following:
@@ -376,9 +376,8 @@ In order to enable use of [Microsoft Entra Security Groups](https://learn.micros
376
376
```
377
377
378
378
3. Finally, configure your app in Microsoft Entra so that the app can access user groups via the MS Graph API:
379
-
-[Add groups claim](https://learn.microsoft.com/en-gb/entra/identity-platform/optional-claims?tabs=appui#configure-groups-optional-claims) to your app
380
-
-[Enable ID Tokens](https://learn.microsoft.com/en-us/entra/identity-platform/v2-protocols-oidc#enable-id-tokens) for your app
381
-
379
+
-[Add groups claim](https://learn.microsoft.com/en-gb/entra/identity-platform/optional-claims?tabs=appui#configure-groups-optional-claims) to your app
380
+
-[Enable ID Tokens](https://learn.microsoft.com/en-us/entra/identity-platform/v2-protocols-oidc#enable-id-tokens) for your app
382
381
383
382
#### Running your own models using a custom endpoint
// origin is null for some reason when the POST request callback comes from an auth provider like MS entra so we skip this check (CSRF token is still validated)
234
+
// origin is null when the POST request callback comes from an auth provider like MS entra
235
+
// so we skip this check (CSRF token is still validated)
0 commit comments