Wrap up instructions

This commit is contained in:
techknowlogick 2023-03-09 17:01:56 -05:00
parent ea4ee15942
commit 48f7d60c3d

View file

@ -10,15 +10,12 @@ In the upcoming 1.19 release of Gitea a new feature is being adding that allows
<!-- more -->
<!-- instructions sourced originally from: https://github.com/go-gitea/gitea/pull/21441#issuecomment-1429706883 -->
What: In this section, describe what exactly needs to be done to set up Gitea to use Azure Active Directory for authentication. This would include steps like creating an Azure Active Directory app, configuring Gitea to use that app, and testing the configuration.
How: This section would provide a more detailed explanation of the steps outlined in the previous section. This might include screenshots, code snippets, or other resources to help readers follow along.
To get this feature working, in breif you'll need creating an Azure Active Directory app, configuring Gitea to use that app, and then map Azure Active Directory groups to Gitea teams. This post will walk you through the steps to get this working.
What if: Finally, this section would address any potential issues or challenges that readers might encounter while setting up Gitea to use Azure Active Directory for authentication. You could provide troubleshooting tips, resources for further help, or suggestions for alternative solutions.
Below I'll explain all the required steps to achieve the mapping of Azure user groups to different teams in Gitea, without having on-premise AD.
Below I'll explain all the required steps to achieve the mapping of Azure user groups to different teams in Gitea, without having on-premise AD, just in case there is someone that wants to do this like us.
AZURE CONFIGURATION
AZURE CONFIGURATION:
Create an application in App Registrations. The Redirect URI is not needed to be configured at this point.
@ -52,7 +49,7 @@ In the Enterprise Application created, in Users and groups section, add the grou
![Azure screenshot showing adding/removing groups to use for mapping](/demos/oidcmapping/8.png)
GITEA CONFIGURATION
GITEA CONFIGURATION:
In the site configuration, under Authentication Sources section, create a new OAuth2 one.
Give it an Authentication Name and use OpenID Connect as the OAuth2 Provider.
@ -74,6 +71,6 @@ Update the Authentication Source and test it with OpenID login option. Your user
![Gitea screenshot copying in the OIDC Auto discovery URL and adding in the mapping](/demos/oidcmapping/12.png)
Hope this helps anyone that wants to use SSO with Azure and add automatically their users to an organization team 😃.
Finally, a big thank you to KN4CK3R for their work on the PR that made this possible.
TODO: Give thanks to kn4ck3r for their work on the PR that made this possible.
Hope this helps anyone that wants to use SSO with Azure and add automatically their users to an organization team 😃. If you do use this, and find any issues, please feel free to open up an issue on the Gitea issue tracker.