File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -24,7 +24,7 @@ Vouch Proxy supports many OAuth and OIDC login providers and can enforce authent
2424- [ Discord] ( https://github.com/eltariel/foundry-docker-nginx-vouch )
2525- [ SecureAuth] ( https://github.com/vouch/vouch-proxy/blob/master/config/config.yml_example_secureauth )
2626- [ Gitea] ( https://github.com/vouch/vouch-proxy/blob/master/config/config.yml_example_gitea )
27- - Keycloak
27+ - [ Keycloak] ( config/config.yml_example_keycloak )
2828- [ OAuth2 Server Library for PHP] ( https://github.com/vouch/vouch-proxy/issues/99 )
2929- [ HomeAssistant] ( https://developers.home-assistant.io/docs/en/auth_api.html )
3030- [ OpenStax] ( https://github.com/vouch/vouch-proxy/pull/141 )
Original file line number Diff line number Diff line change 1+
2+ # Vouch Proxy configuration
3+ # bare minimum to get Vouch Proxy running with Keycloak
4+
5+ vouch:
6+ domains:
7+ - yourdomain.com
8+
9+ # - OR -
10+ # instead of setting specific domains you may prefer to allow all users...
11+ # set allowAllUsers: true to use Vouch Proxy to just accept anyone who can authenticate at the configured provider
12+ # and set vouch.cookie.domain to the domain you wish to protect
13+ # allowAllUsers: true
14+
15+ cookie:
16+ # allow the jwt/cookie to be set into http://yourdomain.com (defaults to true, requiring https://yourdomain.com)
17+ secure: false
18+ # vouch.cookie.domain must be set when enabling allowAllUsers
19+ # domain: yourdomain.com
20+
21+ oauth:
22+ # Generic OpenID Connect
23+ # for Keycloak
24+ provider: oidc
25+ client_id: xxxxxxxxxxxxxxxxxxxxxxxxxxxx
26+ client_secret: xxxxxxxxxxxxxxxxxxxxxxxx
27+ auth_url: https://{yourKeycloakDomain}/realms/{yourKeycloakRealm}/protocol/openid-connect/auth
28+ token_url: https://{yourKeycloakDomain}/realms/{yourKeycloakRealm}/protocol/openid-connect/token
29+ user_info_url: https://{yourKeycloakDomain}/realms/{yourKeycloakRealm}/protocol/openid-connect/userinfo
30+ scopes:
31+ - openid
32+ - email
33+ - profile
34+ callback_url: http://vouch.yourdomain.com:9090/auth
35+ # you can get values of of auth_url, token_url and user_info_url from https://{yourKeycloakDomain}/realms/{yourKeycloakRealm}/.well-known/openid-configuration
36+ # When configuring client in Keycloak, you should use following values
37+ ## valid redirect: http://vouch.yourdomain.com:9090/auth
38+ ## valid logout: http://vouch.yourdomain.com:9090/logout
39+ ## web origin: http://vouch.yourdomain.com:9090
You can’t perform that action at this time.
0 commit comments