doc: improve the example in README to be able to get user roles using the userinfo endpoint (#12)

This commit is contained in:
Nikolay Stupak 2020-08-26 11:52:12 +03:00 committed by GitHub
parent 0a9bdb56ad
commit b0d037cca9
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 5 additions and 5 deletions

View File

@ -230,7 +230,7 @@ For a full example of a login page's template see [source code](internal/web/tem
- --grant-types - --grant-types
- implicit - implicit
- --scope - --scope
- openid,profile,email - openid,profile,email,roles
- --callbacks - --callbacks
- http://localhost:3000 - http://localhost:3000
- --post-logout-callbacks - --post-logout-callbacks
@ -255,8 +255,8 @@ For a full example of a login page's template see [source code](internal/web/tem
URLS_LOGIN: http://localhost:8080/auth/login URLS_LOGIN: http://localhost:8080/auth/login
URLS_CONSENT: http://localhost:8080/auth/consent URLS_CONSENT: http://localhost:8080/auth/consent
URLS_LOGOUT: http://localhost:8080/auth/logout URLS_LOGOUT: http://localhost:8080/auth/logout
WEBFINGER_OIDC_DISCOVERY_SUPPORTED_SCOPES: profile,email,phone WEBFINGER_OIDC_DISCOVERY_SUPPORTED_SCOPES: profile,email,phone,roles
WEBFINGER_OIDC_DISCOVERY_SUPPORTED_CLAIMS: name,family_name,given_name,nickname,email,phone_number WEBFINGER_OIDC_DISCOVERY_SUPPORTED_CLAIMS: name,family_name,given_name,nickname,email,phone_number,https://github.com/i-core/werther/claims/roles
DSN: memory DSN: memory
command: serve all --dangerous-force-http command: serve all --dangerous-force-http
networks: networks:
@ -270,7 +270,7 @@ For a full example of a login page's template see [source code](internal/web/tem
depends_on: depends_on:
- werther - werther
werther: werther:
image: icoreru/werther:v1.0.0 image: icoreru/werther:v1.1.1
environment: environment:
WERTHER_IDENTP_HYDRA_URL: http://hydra:4445 WERTHER_IDENTP_HYDRA_URL: http://hydra:4445
WERTHER_LDAP_ENDPOINTS: ldap:389 WERTHER_LDAP_ENDPOINTS: ldap:389
@ -307,7 +307,7 @@ For a full example of a login page's template see [source code](internal/web/tem
docker stack deploy -c docker-compose.yml auth docker stack deploy -c docker-compose.yml auth
``` ```
4. Open the browser with http://localhost:4444/oauth2/auth?client_id=test-client&response_type=token&scope=openid%20profile%20email&state=12345678. 4. Open the browser with http://localhost:4444/oauth2/auth?client_id=test-client&response_type=token&scope=openid%20profile%20email%20roles&state=12345678.
## Resources ## Resources