mc idp openid add
The mc idp openid add
command creates an OIDC IDP server configuration.
You can run the command multiple times to set up multiple OpenID providers.
When adding multiple OpenID providers, only one can be a JWT claim-based provider.
All others must be role-based providers.
Example
The following example creates the configuration settings for the myminio
deployment as defined in a new test-config
setup for Dex integration.
mc idp openid add myminio test-config \
client_id = minio-client-app \
client_secret = minio-client-app-secret \
config_url = "http://localhost:5556/dex/.well-known/openid-configuration" \
scopes = "openid,groups" \
redirect_uri = "http://127.0.0.1:10000/oauth_callback" \
role_policy = "consoleAdmin"
Syntax
The command has the following syntax:
mc [ GLOBALFLAGS] idp openid add \
ALIAS \
[ CFG_NAME] \
[ CFG_PARAM1] \
[ CFG_PARAM2] ...
Replace ALIAS
with the alias of an AIStor deployment to configure for OpenID integration.
Replace CFG_NAME
with a unique string for this configuration.
If not specified, the command creates default configuration values.
Replace the [CFG_PARAM#]
with each of the configuration setting key-value pairs in the format of PARAMETER="value"
.
Brackets []
indicate optional parameters.
Parameters sharing a line are mutually dependent.
Parameters separated using the pipe |
operator are mutually exclusive.
Copy the example to a text editor and modify as needed before running the command in the terminal/shell.
This command supports any of the global flags .
The mc
commandline tool is built for compatibility with the AWS S3 API and is tested with AIStor and AWS S3 for expected functionality and behavior.
AIStor provides no guarantees for other S3-compatible services, as their S3 API implementation is unknown and therefore unsupported.
While mc
commands may work as documented, any such usage is at your own risk.