馃殌 Announcing BYOC and the OpenTelemetry Distribution BuilderRead more

OpenID Connect Authentication

How to configure Bindplane to use OpenID Connect for Authentication

important

馃毀 This feature is only available in Bindplane Enterprise and Bindplane for Google. Learn more here.

1. Prerequisites

Before beginning, ensure you have the following:

  • An OpenID Connect (OIDC) provider configured and available.
  • OAuth2 Client ID and Client Secret from your OIDC provider.

2. Configuration

Configuration Steps

  1. Open the Bindplane configuration file (by default at /etc/bindplane/config.yaml).

  2. Add or modify the following OIDC configuration settings:

yaml
1auth:
2  type: oidc
3  oidc:
4    issuer: "https://your-oidc-provider.com"
5    oauth2ClientID: "your-client-id"
6    oauth2ClientSecret: "your-client-secret"
7    scopes:
8      - openid
9      - profile
10      - email
  1. Replace the placeholder values:

    • issuer: Your OIDC provider's URL
    • oauth2ClientID: OAuth2 client ID from your OIDC provider
    • oauth2ClientSecret: OAuth2 client Secret from your OIDC provider
  2. Restart Bindplane to apply the changes:

bash
1systemctl restart bindplane

After configuration, users will be redirected to your OIDC provider for authentication when accessing Bindplane.