@@ -1856,11 +1856,40 @@ Log in to a server
1856
1856
# Log in to the given server through a browser
1857
1857
oc login localhost:8443 --web --callback-port 8280
1858
1858
1859
+ ifdef::openshift-dedicated,openshift-rosa[]
1859
1860
# Log in to the external OIDC issuer through Auth Code + PKCE by starting a local server listening port 8080
1860
- oc login localhost:8443 --exec-plugin=oc-oidc --client-id=client-id --extra-scopes=email,profile --callback-port=8080
1861
+ oc login --exec-plugin=oc-oidc --issuer-url=<issuer_url> --client-id=<client_id> --extra-scopes=email,profile --callback-port=8080
1862
+
1863
+ # Log in with an external OIDC if the external OIDC certificate is not publically trusted
1864
+ oc login --exec-plugin=oc-oidc --issuer-url=<issuer_url> --client-id=<client_id> --extra-scopes=email --callback-port=8080 --oidc-certificate-authority <CA for external OIDC certificate>
1865
+ endif::openshift-dedicated,openshift-rosa[]
1861
1866
----
1862
1867
1868
+ ifdef::openshift-dedicated,openshift-rosa[]
1869
+ .Arguments
1870
+ [cols="30,70"]
1871
+ |===
1872
+ |Option |Definition
1873
+
1874
+ |`--exec-plugin`
1875
+ |Specifies the type of exec plugin credentials used to authenticate the external OIDC issuer. Currently, only `oc-oidc` is supported.
1876
+
1877
+ |`--issuer-url`
1878
+ |Issuer URL for the external issuer. Required.
1879
+
1880
+ |`--client-id`
1881
+ |Client ID for the external OIDC issuer. Only supports Auth Code and PKCE. Required.
1882
+
1883
+ |`--extra-scopes`
1884
+ |Extra scopes for the external OIDC issuer. Optional.
1885
+
1886
+ |`--callback-port`
1887
+ |The port that the callback server is redirected to after authentication flow is complete. The default is any random, open port.
1863
1888
1889
+ |`--oidc-certificate-authority`
1890
+ |Path to a certificate file for the external OIDC certificate authority.
1891
+ |===
1892
+ endif::openshift-dedicated,openshift-rosa[]
1864
1893
1865
1894
== oc logout
1866
1895
End the current server session
0 commit comments