Skip to content

Commit 9481527

Browse files
authored
Merge pull request #213 from staticf0x/fix-404
Fix 404 link
2 parents 488419f + 3422ba3 commit 9481527

File tree

1 file changed

+1
-1
lines changed
  • docs/modules/ROOT/pages/getting-started

1 file changed

+1
-1
lines changed

docs/modules/ROOT/pages/getting-started/cli.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Whether you need to enable CLI access, or to gain access once it is available, r
2828

2929
.Procedure
3030

31-
. Follow link:https://docs.nginx.com/nginx-management-suite/admin-guides/authentication/oidc/oidc-keycloak/[these instructions] to set up Keycloak as an OpenID Connect (OIDC) identity provider. Be aware that, when installing {ProductName}, you already set up a Keycloak server and created a realm called `redhat-external`.
31+
. Follow link:https://docs.nginx.com/nginx-instance-manager/admin-guide/authentication/oidc/keycloak-setup/[these instructions] to set up Keycloak as an OpenID Connect (OIDC) identity provider. Be aware that, when installing {ProductName}, you already set up a Keycloak server and created a realm called `redhat-external`.
3232
. In your preferred text editor, use the `kubeconfig` template below to create a template specific to your organization. Be sure to provide the following values, specific to your organization, for the corresponding fields in the template file:
3333
.. The API URL for your cluster, for example: `https://api-toolchain-host-operator.apps.stone-prd-host1.wdlc.p1.openshiftapps.com`
3434
.. Your OIDC issuer URL, for example: `https://sso.redhat.com/auth/realms/redhat-external`

0 commit comments

Comments
 (0)