You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/configuration.md
+1-15Lines changed: 1 addition & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ Caluma expects a bearer token to be passed on as [Authorization Request Header F
28
28
*`OIDC_GROUPS_CLAIM`: Name of claim to be used to represent groups (default: caluma\_groups)
29
29
*`OIDC_USERNAME_CLAIM`: Name of claim to be used to represent the username (default: sub)
30
30
*`OIDC_BEARER_TOKEN_REVALIDATION_TIME`: Time in seconds before bearer token validity is verified again. For best security token is validated on each request per default. It might be helpful though in case of slow Open ID Connect provider to cache it. It uses [cache](configuration.md#cache) mechanism for memorizing userinfo result. Number has to be lower than access token expiration time. (default: 0)
31
-
*`CALUMA_OIDC_USER_FACTORY`: User object factory (default: `caluma.caluma_user.models.OIDCUser`). Use it to provide a custom OIDC user object. The factory is expected to accept a mandatory `token` parameter and two optional parameters `userinfo` and `introspection`. Only one of them will be filled, depending on which OIDC endpoint the user information comes from.
31
+
*`CALUMA_OIDC_USER_FACTORY`: User object factory (default: `caluma.caluma_user.models.OIDCUser`). Use it to provide a custom OIDC user object. The factory is expected to accept a mandatory `token` parameter and one optional parameter `claims`.
32
32
33
33
## Cache
34
34
@@ -83,20 +83,6 @@ The same goes for retrieving files. Caluma will respond with a presigned `downlo
83
83
84
84
In case you run HTTPS in your local development environment, you might have a self-signed certificate. The Minio client by default verifies the TLS certificates, so would fail in this case. You can set `MINIO_DISABLE_CERT_CHECKS` to `true` to avoid this. Note: This setting only works if you also set `DEBUG` to `true` as well.
85
85
86
-
## Client tokens
87
-
88
-
If you want to use additional services that need to talk to caluma (e.g. [caluma-interval](https://github.com/projectcaluma/caluma-interval)), you need to have an additional OIDC-client with the `token_introspection` scope key.
89
-
90
-
Following environment variables need to be set for caluma:
91
-
92
-
*`OIDC_INTROSPECT_ENDPOINT`: introspect endpoint from the OIDC-provider
93
-
*`OIDC_INTROSPECT_CLIENT_ID`: ID of the OIDC-client
94
-
*`OIDC_INTROSPECT_CLIENT_SECRET`: Secret of the OIDC-client
95
-
96
-
Some OIDC implementations (e.g. keycloak), allow for querying the `userinfo` endpoint with a client token. In that case the `introspection` endpoint is never called.
97
-
98
-
The attribute `claims_source` on `OIDCUser` instances indicates the source of the claims.
99
-
100
86
## uWSGI defaults
101
87
102
88
We are using the sane uWSGI-defaults researched by [bloomberg](https://www.techatbloomberg.com/blog/configuring-uwsgi-production-deployment/?sf104898833=1). You can override the defaults using environment variables.
0 commit comments