OpenID Connect
How to configure Bindplane to use OpenID Connect for Authentication
1. Prerequisites
Before beginning, ensure you have the following:
An OpenID Connect (OIDC) provider configured and available.
OAuth2 Client ID and Client Secret from your OIDC provider.
2. Configuration
Configuration Steps
Open the Bindplane configuration file (by default at
/etc/bindplane/config.yaml
).Add or modify the following OIDC configuration settings:
auth:
type: oidc
oidc:
issuer: "https://your-oidc-provider.com"
oauth2ClientID: "your-client-id"
oauth2ClientSecret: "your-client-secret"
scopes:
- openid
- profile
- email
Replace the placeholder values:
issuer
: Your OIDC provider's URLoauth2ClientID
: OAuth2 client ID from your OIDC provideroauth2ClientSecret
: OAuth2 client Secret from your OIDC provider
Restart Bindplane to apply the changes:
systemctl restart bindplane
Environment Variables
The same settings can also be provided using environment vairables:
BINDPLANE_OIDC_OAUTH2_CLIENT_ID=your-client-id
BINDPLANE_OIDC_OAUTH2_CLIENT_SECRET=your-client-secret
BINDPLANE_OIDC_ISSUER=https://your-oidc-provider.com
BINDPLANE_OIDC_SCOPES=openid,profile,email
After configuration, users will be redirected to your OIDC provider for authentication when accessing Bindplane.
Last updated
Was this helpful?