git clone https
:
//github
.
com/dmikusa-pivotal/static-site-oidc-example
`. This will download the demo app. Then change directory to `static-site-oidc-example
`.vars-uaa-sso.yml
` and rename it `vars.yml
`. Don't worry about editing the name right now. Note: These instructions are for using Pivotal SSO and UAA, but they will work with any OIDC compliant provider. See the other `vars.yml
` templates for help with other providers.manifest.yml
` and add a route to the `routes:
` block. The route will be the base for some of the SSO configuration options you'll enter when creating the SSO App.cf create-service p-identity some-plan sso-service
`.vars.yml
` file. If you don't see this screen, click "Edit" on your app in the Pivotal SSO UI. Then without making any changes, click "Save" again. That will bring the screen back up.vars.yml
` in your favorite text editor and populate it based on the included comments using the information from the Pivotal SSO UI screen.vars.yml
`, the last setting is `oidc-require-claim
`. This dictates the claim that will be required for a user to be considered authorized to access the site. The default example is `email:admin
` , which allows access to a single user with the email of "admin". To get started, change "admin" to the user you'll be using to login to the site..bp-config/httpd/extra/httpd-php.conf
` and uncomment the line, `OIDCSSLValidateServer Off
`. This disables validation of the TLS cert used by the OIDC provider..bp-config/options.json
` and configure `ADMIN_EMAIL
`. This is the email address that will be displayed on error pages generated by Apache Web Server.cf push --vars-file vars.yml
`. This will deploy your app using the custom `vars.yml
` file that you created.The answer to this is that it depends on what you selected for an Identity Provider when you created your SSO App in the Pivotal SSO GUI. In most cases, you'll be selecting your company's corporate Identity Provider and should require you to login with your company credentials. In many cases, you may already be logged in so you won't even be asked to authenticate.
If you're using this in a test environment where you do not have a corporate Identity Provider configured, you can use the system or UAA provider, which allows you to authenticate with users that exist in UAA. If you go this route, you will need to create some users before you can login. Instructions for doing this can be found at this link .
site/
` folder under the root of your project folder. Put all of your static files in this folder..bp-config/
` folder, the `.profile
` file, the `vars.yml
` file and the `manifest.yml
` file to the root of your new project.manifest.yml
` file and change your application name & routes.vars.yml
` to contain the information from your new Pivotal SSO App.cf push
` to deploy your new application.