Skip to content

Commit 8ad1528

Browse files
add password auth docs
1 parent 13fd68b commit 8ad1528

File tree

1 file changed

+9
-0
lines changed

1 file changed

+9
-0
lines changed

pages/getting-started/advanced-config/sandboxing.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,15 @@ To set it up, you need to configure a few env vars as well, in particular:
3838

3939
To simplify permission management, you can also configure specific emails to automatically be made admins via another env var: `CONSOLE_ADMIN_EMAILS`. It should be a comma seperated list, and on login we'll provision that user to be an admin w/in your Plural console instance. We'd recommend only setting this for a small set of users, then using group bindings for permissions from then on
4040

41+
## Fallback To Password Auth
42+
43+
The best practice for configuring auth in an enterprise environment is to use OIDC-based SSO described above. Sometimes in POC usecases, or similar scenarios, it's easier to use standard username/password auth. This can be done by disabling oidc entirely, which requires two things:
44+
45+
1. Don't set the `OIDC_CLIENT_ID` env var
46+
2. ensure `secrets.plural_client_id` is also not in the helm values or is empty (this is what handles using the "log in with plural" experience that is our default).
47+
48+
You usually should only need this if SSO access is logistically hard + you have an egress proxy that prevents usage of "Login With Plural".
49+
4150
## Sandboxed Compatibility Tables
4251

4352
We also bundle the compatibility and deprecation data in our docker images, and you can disable live polling github by setting the env var:

0 commit comments

Comments
 (0)