From 8789d9812164e49ff11fdccb355b4678ab5e19e5 Mon Sep 17 00:00:00 2001 From: Francois Ribemont Date: Thu, 22 Jan 2026 04:05:07 +0000 Subject: [PATCH] Replicates OIDC_PROVIDER_NAME documentation to versioned_docs --- .../version-0.3.0/authentication/oidc.md | 23 ++++++++++--------- 1 file changed, 12 insertions(+), 11 deletions(-) diff --git a/versioned_docs/version-0.3.0/authentication/oidc.md b/versioned_docs/version-0.3.0/authentication/oidc.md index f3f0551..03d1702 100644 --- a/versioned_docs/version-0.3.0/authentication/oidc.md +++ b/versioned_docs/version-0.3.0/authentication/oidc.md @@ -6,21 +6,22 @@ OpenID Connect is a OAuth2 extension support by most identity providers. To configure OIDC, you must set the following environment variables: -| Variable | Usage | -| -------------------------------- | --------------------------------------------------------------------------------------------------- | -| `OIDC_CLIENT_ID` | Client ID from your identity provider. | -| `OIDC_CLIENT_SECRET` | Client secret from your identity provider. | -| `OIDC_ADMIN_GROUP` | Grant admin to users with this group configured in your identity provider. Tested with Authentik. | -| `DISABLE_SIMPLE_AUTH` (optional) | Disable simple auth | -| `OIDC_USERNAME_CLAIM` (optional) | Change the field that Drop pulls the username claim from. Users are merged based on their usernames | +| Variable | Usage | +| -------------------------------- | ----------------------------------------------------------------------------------------------------------- | +| `OIDC_CLIENT_ID` | Client ID from your identity provider. | +| `OIDC_CLIENT_SECRET` | Client secret from your identity provider. | +| `OIDC_ADMIN_GROUP` | Grant admin to users with this group configured in your identity provider. Tested with Authentik. | +| `DISABLE_SIMPLE_AUTH` (optional) | Disable simple auth | +| `OIDC_USERNAME_CLAIM` (optional) | Change the field that Drop pulls the username claim from. Users are merged based on their usernames | +| `OIDC_PROVIDER_NAME` (optional) | Change the name of the oidc provider that is displayed on the sign-in page. Default is `external provider`. | And then, you must configure **either**: -#### `OIDC_WELLKNOWN`: A unprotected endpoint that returns a OIDC well-known JSON. Fetched on startup. +#### `OIDC_WELLKNOWN`: A unprotected endpoint that returns a OIDC well-known JSON. Fetched on startup --- -#### Individual endpoints: +#### Individual endpoints | Variable | Usage | | -------------------- | ------------------------------------------------------------------------- | @@ -29,6 +30,6 @@ And then, you must configure **either**: | `OIDC_USERINFO` | Userinfo endpoint. Usually ends with `userinfo`. | | `OIDC_SCOPES` | Comma separated list of scopes. Requires, at least, `openid` and `email`. | - ## Redirect URL -Drop uses the `EXTERNAL_URL` environment variable to create the callback URL: `$EXTERNAL_URL/auth/callback/oidc`. + +Drop uses the `EXTERNAL_URL` environment variable to create the callback URL: `$EXTERNAL_URL/auth/callback/oidc`.