mirror of
https://github.com/OpenCTI-Platform/opencti.git
synced 2025-12-22 08:17:08 +00:00
[docs] Updated documentation for SSO connection config #12858
* [docs] updated documentation for SSO connection config * Update docs/deployment/authentication.md Co-authored-by: A. Jard <angelique.jard@filigran.io> * Update docs/deployment/authentication.md Co-authored-by: A. Jard <angelique.jard@filigran.io> --------- Co-authored-by: A. Jard <angelique.jard@filigran.io>
This commit is contained in:
@@ -79,6 +79,30 @@ If you would like to use LDAP groups to automatically associate LDAP groups and
|
||||
}
|
||||
```
|
||||
|
||||
### Base URL Configuration (Important for all SSO strategies)
|
||||
|
||||
When configuring any SSO authentication provider (SAML, OpenID, Auth0, etc.), the application may need to know the external base URL to fallback on it as default on some use cases.
|
||||
|
||||
You need to set the `base_url` parameter to your actual OpenCTI URL, either via environment variable or configuration file.
|
||||
|
||||
Option 1 - Environment variable
|
||||
|
||||
```yaml
|
||||
APP__BASE_URL=<your OpenCTI url>
|
||||
```
|
||||
|
||||
Option 2 - Configuration file
|
||||
|
||||
```json
|
||||
{
|
||||
"app": {
|
||||
"base_url": "<your OpenCTI url>/"
|
||||
}
|
||||
}
|
||||
```
|
||||
> ⚠️ Make sure the URL ends with a / and matches the domain exposed to your users.
|
||||
|
||||
|
||||
### SAML (button)
|
||||
|
||||
This strategy can be used to authenticate your user with your company SAML and is based on [Passport - SAML](http://www.passportjs.org/packages/passport-saml).
|
||||
|
||||
Reference in New Issue
Block a user