You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
3. Make sure in your administration **General settings** you have enabled `Enable OIDC login?` flag:
@@ -59,8 +59,47 @@ OIDC_SCOPE="openid"
59
59
60
60

61
61
62
+
## Example - Authentik
63
+
64
+
In this example we will use the Authentik Docker image, but feel free to use another OIDC provider.
65
+
66
+
1. Follow the steps in the Authentik documentation for the Setup you like, here we used the docker-compose Setup: [https://goauthentik.io/docs/installation/docker-compose](https://goauthentik.io/docs/installation/docker-compose)
67
+
2. Add a OpenID Property in Authentik
68
+
Go to the Admin Panel under Customisation -> Property Mappings. Create a new Mapping as "Scope Mapping" with the following values:
69
+
70
+
|Attribute|Value|
71
+
|---|---|
72
+
|Name|ex. Family_Name OpenID|
73
+
|Scope|profile|
74
+
|Description||
75
+
|Expression|```return { "family_name": "" } ```|
76
+
77
+
When creating a new OpenID Provider you have to go to "Advanced protocol settings" and select the previously named scope additionally.
0 commit comments