diff --git a/authelia/helm-values.yaml b/authelia/helm-values.yaml index 07e7f94..23cf114 100644 --- a/authelia/helm-values.yaml +++ b/authelia/helm-values.yaml @@ -24,6 +24,8 @@ pod: items: - key: HEADLAMP_CLIENT_SECRET path: HEADLAMP_CLIENT_SECRET + - key: VAULT_CLIENT_SECRET + path: VAULT_CLIENT_SECRET - key: identity_providers.oidc.jwks.key path: jwks.pem extraVolumeMounts: @@ -35,6 +37,10 @@ pod: mountPath: /secrets/HEADLAMP_CLIENT_SECRET subPath: HEADLAMP_CLIENT_SECRET readOnly: true + - name: oidc-secrets + mountPath: /secrets/VAULT_CLIENT_SECRET + subPath: VAULT_CLIENT_SECRET + readOnly: true - name: oidc-secrets mountPath: /secrets/jwks.pem subPath: jwks.pem @@ -120,6 +126,21 @@ configMap: - email - groups token_endpoint_auth_method: client_secret_post + - client_id: vault + client_name: Vault + client_secret: + path: /secrets/VAULT_CLIENT_SECRET + public: false + authorization_policy: one_factor + redirect_uris: + - https://vault0213.kro.kr/ui/vault/auth/oidc/oidc/callback + - http://localhost:8250/oidc/callback + scopes: + - openid + - profile + - email + - groups + token_endpoint_auth_method: client_secret_post # Secret configuration - use existing secret from Vault secret: diff --git a/authelia/vault/authelia-secrets.yaml b/authelia/vault/authelia-secrets.yaml index ac32652..4fe8cc7 100644 --- a/authelia/vault/authelia-secrets.yaml +++ b/authelia/vault/authelia-secrets.yaml @@ -47,3 +47,8 @@ spec: remoteRef: key: cluster-infrastructure/authelia property: HEADLAMP_CLIENT_SECRET + # Vault OIDC client secret + - secretKey: VAULT_CLIENT_SECRET + remoteRef: + key: cluster-infrastructure/authelia + property: VAULT_CLIENT_SECRET