Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
ansible-warpzone
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Model registry
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
infrastruktur
ansible-warpzone
Commits
69e86b10
Commit
69e86b10
authored
1 year ago
by
Christian Elberfeld
Browse files
Options
Downloads
Patches
Plain Diff
vpnserver
parent
7a6b5415
No related branches found
No related tags found
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
testserver/docker_vpnserver/templates/config.yaml
+16
-0
16 additions, 0 deletions
testserver/docker_vpnserver/templates/config.yaml
with
16 additions
and
0 deletions
testserver/docker_vpnserver/templates/config.yaml
+
16
−
0
View file @
69e86b10
...
...
@@ -26,3 +26,19 @@ auth:
-
openid
-
profile
-
email
# You can optionally restrict access to users with an email address
# that matches an allowed domain.
# If empty or omitted then all email domains will be allowed.
# This is an advanced feature that allows you to define OIDC claim mapping expressions.
# This feature is used to define wg-access-server admins based off a claim in your OIDC token.
# A JSON-like object of claimKey: claimValue pairs as returned by the issuer is passed to the evaluation function.
# See https://github.com/Knetic/govaluate/blob/9aa49832a739dcd78a5542ff189fb82c3e423116/MANUAL.md for the syntax.
claimMapping
:
# This example works if you have a custom group_membership claim which is a list of strings
admin
:
"
true"
access
:
"
true"
# Let wg-access-server retrieve the claims from the ID Token instead of querying the UserInfo endpoint.
# Some OIDC authorization provider implementations (e.g. ADFS) only publish claims in the ID Token.
claimsFromIDToken
:
false
# require this claim to be "true" to allow access for the user
# accessClaim: "access"
\ No newline at end of file
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment