Auto-enabling the OIDC APIs is convenient for people using the new `matrix_synapse_oidc_*` variables.pull/3093/head
| @@ -46,7 +46,7 @@ Certain Synapse administration tasks (managing users and rooms, etc.) can be per | |||
| ## Synapse + OpenID Connect for Single-Sign-On | |||
| If you'd like to use OpenID Connect authentication with Synapse, you'll need some additional reverse-proxy configuration (see [our nginx reverse-proxy doc page](configuring-playbook-nginx.md#synapse-openid-connect-for-single-sign-on)). | |||
| If you'd like to use OpenID Connect authentication with Synapse, you'll need some additional configuration. | |||
| This example configuration is for [keycloak](https://www.keycloak.org/), an opensource Identity Provider maintained by Red Hat. | |||
| @@ -54,23 +54,26 @@ For more detailed documentation on available options and how to setup keycloak, | |||
| In case you encounter errors regarding the parsing of the variables, you can try to add `{% raw %}` and `{% endraw %}` blocks around them. For example ; | |||
| ```yml | |||
| matrix_synapse_oidc_enabled: true | |||
| matrix_synapse_oidc_providers: | |||
| - idp_id: keycloak | |||
| idp_name: "My KeyCloak server" | |||
| issuer: "https://url.ix/auth/realms/{realm_name}" | |||
| client_id: "matrix" | |||
| client_secret: "{{ vault_synapse_keycloak }}" | |||
| scopes: ["openid", "profile"] | |||
| user_mapping_provider: | |||
| config: | |||
| localpart_template: "{% raw %}{{ user.preferred_username }}{% endraw %}" | |||
| display_name_template: "{% raw %}{{ user.name }}{% endraw %}" | |||
| email_template: "{% raw %}{{ user.email }}{% endraw %}" | |||
| allow_existing_users: true # Optional | |||
| backchannel_logout_enabled: true # Optional | |||
| ``` | |||
| matrix_synapse_configuration_extension_yaml: | | |||
| oidc_providers: | |||
| - idp_id: keycloak | |||
| idp_name: "My KeyCloak server" | |||
| issuer: "https://url.ix/auth/realms/{realm_name}" | |||
| client_id: "matrix" | |||
| client_secret: "{{ vault_synapse_keycloak }}" | |||
| scopes: ["openid", "profile"] | |||
| user_mapping_provider: | |||
| config: | |||
| localpart_template: "{% raw %}{{ user.preferred_username }}{% endraw %}" | |||
| display_name_template: "{% raw %}{{ user.name }}{% endraw %}" | |||
| email_template: "{% raw %}{{ user.email }}{% endraw %}" | |||
| allow_existing_users: true # Optional | |||
| backchannel_logout_enabled: true # Optional | |||
| ``` | |||
| **NOTE**: if you inject the OIDC configuration using `matrix_synapse_configuration_extension_yaml` (instead of `matrix_synapse_oidc_enabled: true` + `matrix_synapse_oidc_providers`), then the OIDC routes (`/_synapse/oidc`) will not be publicly exposed automatically. In such a case, you'd need to expose them manually by toggling: `matrix_synapse_container_labels_public_client_synapse_oidc_api_enabled: true`. | |||
| ## Customizing templates | |||
| @@ -228,7 +228,7 @@ matrix_synapse_container_labels_public_client_synapse_client_api_traefik_tls_cer | |||
| # Enable this if you need OpenID Connect authentication support. | |||
| # Regardless of whether this is enabled, it may or may not take effect due to the value of other variables. | |||
| # See `matrix_synapse_container_labels_traefik_enabled` or `matrix_synapse_container_labels_matrix_related_labels_enabled` | |||
| matrix_synapse_container_labels_public_client_synapse_oidc_api_enabled: false | |||
| matrix_synapse_container_labels_public_client_synapse_oidc_api_enabled: "{{ matrix_synapse_oidc_enabled }}" | |||
| matrix_synapse_container_labels_public_client_synapse_oidc_api_traefik_hostname: "{{ matrix_synapse_container_labels_traefik_hostname }}" | |||
| matrix_synapse_container_labels_public_client_synapse_oidc_api_traefik_path_prefix: /_synapse/oidc | |||
| matrix_synapse_container_labels_public_client_synapse_oidc_api_traefik_rule: "Host(`{{ matrix_synapse_container_labels_public_client_synapse_oidc_api_traefik_hostname }}`) && PathPrefix(`{{ matrix_synapse_container_labels_public_client_synapse_oidc_api_traefik_path_prefix }}`)" | |||
| @@ -253,7 +253,7 @@ matrix_synapse_container_labels_public_client_synapse_admin_api_traefik_tls_cert | |||
| # Controls whether labels will be added that expose the Server-Server API (Federation API). | |||
| # Regardless of whether this is enabled, it may or may not take effect due to the value of other variables. | |||
| # See `matrix_synapse_container_labels_traefik_enabled` or `matrix_synapse_container_labels_matrix_related_labels_enabled` | |||
| matrix_synapse_container_labels_public_federation_api_enabled: "{{ matrix_synapse_federation_enabled and not matrix_synapse_workers_enabled }}" | |||
| matrix_synapse_container_labels_public_federation_api_enabled: "{{ matrix_synapse_federation_enabled and matrix_synapse_federation_port_enabled and not matrix_synapse_workers_enabled }}" | |||
| matrix_synapse_container_labels_public_federation_api_traefik_hostname: "{{ matrix_synapse_container_labels_traefik_hostname }}" | |||
| matrix_synapse_container_labels_public_federation_api_traefik_path_prefix: /_matrix | |||
| matrix_synapse_container_labels_public_federation_api_traefik_rule: "Host(`{{ matrix_synapse_container_labels_public_federation_api_traefik_hostname }}`) && PathPrefix(`{{ matrix_synapse_container_labels_public_federation_api_traefik_path_prefix }}`)" | |||
| @@ -92,7 +92,7 @@ | |||
| - {'old': 'matrix_nginx_proxy_proxy_riot_compat_redirect_hostname', 'new': '<redirecting the riot domain to an element domain is no longer supported - you can implement it yourself using matrix_client_element_container_labels_additional_labels>'} | |||
| - {'old': 'matrix_nginx_proxy_proxy_matrix_client_redirect_root_uri_to_domain', 'new': '<superseded by matrix_synapse_container_labels_public_client_root_redirection_* or other equivalent variables based on the homeserver implementation you use>'} | |||
| - {'old': 'matrix_nginx_proxy_proxy_matrix_client_api_forwarded_location_synapse_client_api_enabled', 'new': 'matrix_synapse_container_labels_public_client_synapse_client_api_enabled'} | |||
| - {'old': 'matrix_nginx_proxy_proxy_matrix_client_api_forwarded_location_synapse_oidc_api_enabled', 'new': 'matrix_synapse_container_labels_public_client_synapse_oidc_api_enabled'} | |||
| - {'old': 'matrix_nginx_proxy_proxy_matrix_client_api_forwarded_location_synapse_oidc_api_enabled', 'new': '<replaced by matrix_synapse_container_labels_public_client_synapse_oidc_api_enabled, but if you use matrix_synapse_oidc_enabled then it would be toggled automatically; see the new recommended OIDC example configuration in docs/configuring-playbook-synapse.md>'} | |||
| - {'old': 'matrix_nginx_proxy_proxy_matrix_client_api_forwarded_location_synapse_admin_api_enabled', 'new': 'matrix_synapse_container_labels_public_client_synapse_admin_api_enabled'} | |||
| - {'old': 'matrix_nginx_proxy_proxy_matrix_identity_api_enabled', 'new': '<superseded by matrix_ma1sd_container_labels_traefik_enabled and matrix_ma1sd_container_labels_matrix_identity_enabled>'} | |||
| - {'old': 'matrix_nginx_proxy_proxy_matrix_identity_api_addr_with_container', 'new': '<removed>'} | |||