diff --git a/.env.template b/.env.template deleted file mode 100644 index e69de29b..00000000 diff --git a/CHANGELOG.md b/CHANGELOG.md index 5e79c617..993af968 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -6,6 +6,17 @@ and this project adheres to [Semantic Versioning](http://semver.org/). ## Unreleased +# OIDC and KML support release + +To configure your OIDC provider, set the following environment variables: + +``` +OIDC_CLIENT_ID=client_id_example +OIDC_CLIENT_SECRET=client_secret_example +OIDC_ISSUER=https://authentik.yourdomain.com/application/o/dawarich/ +OIDC_REDIRECT_URI=https://your-dawarich-url.com/users/auth/openid_connect/callback +``` + ## Added - Support for KML file uploads. #350 @@ -15,21 +26,12 @@ and this project adheres to [Semantic Versioning](http://semver.org/). - The map settings panel is now scrollable ---- - ## Changed - Internal redis settings updated to implement support for connecting to Redis via unix socket. #1706 - - Implemented authentication via GitHub and Google for Dawarich Cloud. - Implemented OpenID Connect authentication for self-hosted Dawarich instances. #66 -## TODO: - -- [ ] Disable OIDC authentication for Dawarich Cloud -- [ ] Disable GitHub and Google authentication for self-hosted Dawarich -- [ ] In selfhosted env, no registrations are allowed, we need to account OIDC into that - # [0.35.1] - 2025-11-09 diff --git a/docker/.env.example b/docker/.env.example index afc8625c..18efe182 100644 --- a/docker/.env.example +++ b/docker/.env.example @@ -149,10 +149,10 @@ APP_MEMORY_LIMIT=4G # Option 1: Using OIDC Discovery (Recommended) # Set OIDC_ISSUER to your provider's issuer URL (e.g., https://auth.example.com) # The provider must support OpenID Connect Discovery (.well-known/openid-configuration) -OIDC_CLIENT_ID= -OIDC_CLIENT_SECRET= -OIDC_ISSUER= -OIDC_REDIRECT_URI= +OIDC_CLIENT_ID=client_id_example +OIDC_CLIENT_SECRET=client_secret_example +OIDC_ISSUER=https://authentik.yourdomain.com/application/o/dawarich/ +OIDC_REDIRECT_URI=https://your-dawarich-url.com/users/auth/openid_connect/callback # Option 2: Manual Endpoint Configuration (if discovery is not supported) # Use this if your provider doesn't support OIDC discovery