forked from cloudfoundry/cf-deployment
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathadd-oidc-provider.yml
189 lines (177 loc) · 4.83 KB
/
add-oidc-provider.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
---
- type: replace
path: /instance_groups/name=uaa/jobs/name=uaa/properties/login/oauth?/providers
value:
cli-oidc-provider:
type: oidc1.0
discoveryUrl: https://uaa-oidc.service.cf.internal:8443/.well-known/openid-configuration
scopes:
- openid
linkText: My other uaa Oauth Provider
showLinkText: true
addShadowUserOnLogin: true
relyingPartyId: rp_oidc_admin
relyingPartySecret: ((rp_oidc_provider_admin_secret))
skipSslValidation: true
storeCustomAttributes: true
passwordGrantEnabled: true
attributeMappings:
given_name: given_name
family_name: family_name
user_name: user_name
- type: replace
path: /instance_groups/-
value:
name: uaa-oidc
instances: 1
azs: [z1, z2, z3]
vm_type: default
stemcell: default
persistent_disk: 500
networks:
- name: default
jobs:
- name: uaa
release: uaa
properties:
encryption:
active_key_label: 'key-1'
encryption_keys:
- label: 'key-1'
passphrase: "((uaa_oidc_encryption_key_passphrase))"
uaadb:
address: sql-db.service.cf.internal
databases:
- name: uaa_oidc
tag: uaa
db_scheme: mysql
port: 3306
roles:
- name: uaa-oidc
password: "((uaa_oidc_database_password))"
tag: admin
tls_enabled: true
uaa:
ca_certs:
- "((mysql_server_certificate.ca))"
url: https://uaa-oidc.service.cf.internal:8443
jwt:
policy:
active_key_id: key-1
keys:
key-1:
signingKey: ((uaa-oidc-key1.private_key))
sslCertificate: ((uaa-oidc_tls.certificate))
sslPrivateKey: ((uaa-oidc_tls.private_key))
clients:
rp_oidc_admin:
authorized-grant-types: authorization_code,client_credentials,refresh_token,user_token,password,urn:ietf:params:oauth:grant-type:saml2-bearer,implicit
redirect-uri: https://uaa.service.cf.internal:8443/login/callback/cli-oidc-provider
scopes:
- openid
- uaa.admin
- clients.read
- clients.write
- clients.secret
- scim.read
- scim.write
- clients.admin
- uaa.user
authorities: uaa.admin,clients.admin
secret: ((rp_oidc_provider_admin_secret))
scim:
user:
override: true
users:
- name: admin-oidc
password: "((uaa_oidc_admin_password))"
groups:
- uaa.admin
login:
protocol: https
saml:
activeKeyId: key1
keys:
key1:
key: ((saml_oidc-key1.private_key))
passphrase: ((saml_oidc_key1_passphrase))
certificate: ((saml_oidc-key1.certificate))
- type: replace
path: /addons/name=bosh-dns-aliases/jobs/name=bosh-dns-aliases/properties/aliases/-
value:
domain: uaa-oidc.service.cf.internal
targets:
- query: '*'
instance_group: uaa-oidc
deployment: cf
network: default
domain: bosh
- type: replace
path: /instance_groups/name=database/jobs/name=pxc-mysql/properties/seeded_databases/-
value:
name: uaa_oidc
username: uaa-oidc
password: "((uaa_oidc_database_password))"
- type: replace
path: /variables/-
value:
name: uaa_oidc_admin_password
type: password
- type: replace
path: /variables/-
value:
name: uaa_oidc_database_password
type: password
- type: replace
path: /variables/-
value:
name: uaa_oidc_encryption_key_passphrase
type: password
- type: replace
path: /variables/-
value:
name: rp_oidc_provider_admin_secret
type: password
- type: replace
path: /variables/-
value:
name: saml_oidc_key1_passphrase
type: password
- type: replace
path: /variables/-
value:
name: uaa-oidc-key1
type: rsa
- type: replace
path: /variables/-
value:
name: uaa-oidc_ca
type: certificate
options:
common_name: uaa-oidc
alternative_names: ["*.uaa-oidc.service.cf.internal"]
extended_key_usage:
- server_auth
is_ca: true
- type: replace
path: /variables/-
value:
name: saml_oidc-key1
type: certificate
update_mode: converge
options:
ca: uaa-oidc_ca
common_name: saml_oidc
alternative_names:
- saml_oidc
- type: replace
path: /variables/-
value:
name: uaa-oidc_tls
type: certificate
update_mode: converge
options:
ca: uaa-oidc_ca
common_name: uaa-oidc.service.cf.internal
alternative_names:
- uaa-oidc.service.cf.internal