You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/getting-started/cli.adoc
+1-1
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ Whether you need to enable CLI access, or to gain access once it is available, r
28
28
29
29
.Procedure
30
30
31
-
. Follow link:https://docs.nginx.com/nginx-management-suite/admin-guides/authentication/oidc/oidc-keycloak/[these instructions] to set up Keycloak as an OpenID Connect (OIDC) identity provider. Be aware that, when installing {ProductName}, you already set up a Keycloak server and created a realm called `redhat-external`.
31
+
. Follow link:https://docs.nginx.com/nginx-instance-manager/admin-guide/authentication/oidc/keycloak-setup/[these instructions] to set up Keycloak as an OpenID Connect (OIDC) identity provider. Be aware that, when installing {ProductName}, you already set up a Keycloak server and created a realm called `redhat-external`.
32
32
. In your preferred text editor, use the `kubeconfig` template below to create a template specific to your organization. Be sure to provide the following values, specific to your organization, for the corresponding fields in the template file:
33
33
.. The API URL for your cluster, for example: `https://api-toolchain-host-operator.apps.stone-prd-host1.wdlc.p1.openshiftapps.com`
34
34
.. Your OIDC issuer URL, for example: `https://sso.redhat.com/auth/realms/redhat-external`
0 commit comments