diff --git a/ansible/roles/authelia-for-gitlab/info.md b/ansible/roles/authelia-for-gitlab/info.md index 9bf2a1f..a558fea 100644 --- a/ansible/roles/authelia-for-gitlab/info.md +++ b/ansible/roles/authelia-for-gitlab/info.md @@ -5,6 +5,6 @@ Um [GitLab](../gitlab) gegen [Authelia](../authelia) authentifizieren zu lassen ## Verweise -- [Authelia-Dokumentation | GitLab Integration](https://www.authelia.com/integration/openid-connect/gitlab/) +- [Authelia-Dokumentation | GitLab Integration](https://www.authelia.com/integration/openid-connect/gitlab/#authelia) - [GitLab-Dokumentation | Use OpenID Connect as an OAuth 2.0 authentication provider](https://docs.gitlab.com/ee/administration/auth/oidc.html) diff --git a/ansible/roles/authelia-for-gitlab/templates/authelia-client-conf.json.j2 b/ansible/roles/authelia-for-gitlab/templates/authelia-client-conf.json.j2 index 2c1f44a..7a6d2a8 100644 --- a/ansible/roles/authelia-for-gitlab/templates/authelia-client-conf.json.j2 +++ b/ansible/roles/authelia-for-gitlab/templates/authelia-client-conf.json.j2 @@ -1,7 +1,7 @@ { - "id": "{{var_authelia_for_gitlab_client_id}}", - "description": "GitLab", - "secret": "{{var_authelia_for_gitlab_client_secret}}", + "client_id": "{{var_authelia_for_gitlab_client_id}}", + "client_secret": "{{var_authelia_for_gitlab_client_secret}}", + "client_name": "GitLab", "public": false, "authorization_policy": "one_factor", "redirect_uris": [ @@ -13,5 +13,6 @@ "groups", "email" ], - "userinfo_signing_algorithm": "none" + "userinfo_signing_algorithm": "none", + "token_endpoint_auth_method": "client_secret_basic" } diff --git a/ansible/roles/authelia-for-gitlab/vardef.json b/ansible/roles/authelia-for-gitlab/vardef.json new file mode 100644 index 0000000..86bb76b --- /dev/null +++ b/ansible/roles/authelia-for-gitlab/vardef.json @@ -0,0 +1,14 @@ +{ + "gitlab_url_base": { + "type": "string", + "mandatory": false + }, + "client_id": { + "type": "string", + "mandatory": false + }, + "client_secret": { + "type": "string", + "mandatory": false + } +}