|
@@ -183,8 +183,8 @@ rp.post_logout_redirect_uri::
|
|
|
will not trigger a new OpenID Connect Authentication, such as +$\{kibana-url}/security/logged_out+ or
|
|
|
+$\{kibana-url}/login?msg=LOGGED_OUT+ where _$\{kibana-url}_ is the base URL for your {kib} instance.
|
|
|
|
|
|
-claims.principal:: See <<oidc-claims-mapping>>.
|
|
|
-claims.groups:: See <<oidc-claims-mapping>>.
|
|
|
+claims.principal:: See <<oidc-claims-mappings>>.
|
|
|
+claims.groups:: See <<oidc-claims-mappings>>.
|
|
|
|
|
|
A final piece of configuration of the OpenID Connect realm is to set the `Client Secret` that was assigned
|
|
|
to the RP during registration in the OP. This is a secure setting and as such is not defined in the realm
|
|
@@ -205,7 +205,7 @@ available at a well known URL, which is the concatenation of their `Issuer` valu
|
|
|
That document should contain all the necessary information to configure the OpenID Connect realm in {es}.
|
|
|
|
|
|
|
|
|
-[[oidc-claims-mapping]]
|
|
|
+[[oidc-claims-mappings]]
|
|
|
==== Claims mapping
|
|
|
|
|
|
===== Claims and scopes
|