OIDC settings in Helm
Configure OIDC settings for the Gloo UI in Helm so that your settings remain even after version upgrades.
You can also persist the OIDC sessions in a Redis instance by configuring Helm values.
Configure OIDC values in your Gloo Mesh Gateway deployment
You can configure the OIDC values for the Gloo UI when you install Gloo Mesh Gateway via Helm. This way, when you manage your releases through the helm upgrade
process, your Dashboard
custom resource settings are kept.
Get the client secret from your OIDC provider.
Create a Kubernetes secret with the OIDC client secret in the same namespace as you intend to install the Gloo UI, such as
gloo-mesh
. Do not include any Helm labels or annotations in the metadata. The following example usesdashboard
in thegloo-mesh
namespace.Follow the steps in the guides to upgrade or install Gloo Mesh Gateway. Update your Helm configuration file to remove the
glooUi.auth.oidc.clientSecret
setting and refer to the secret that you just created in theglooUi.auth.oidc.clientSecretName
setting.
Store UI sessions
You can configure the Gloo UI to store sessions in a browser cookie by using the glooUi.auth.oidc.session
setting in your Helm values file.
Cookie
When you enable the Gloo UI, authentication sessions are automatically persisted by storing the OIDC ID tokens in encrypted browser cookies. No additional configuration is necessary.
The following example shows the default Helm values that are used to store Gloo UI auth sessions in a browser cookie.
Optionally, you can configure the cookie settings by using the Dashboard authn.oidc.session.cookieOptions
settings. For more information, see the API docs. Note that Dashboard settings are reset when you upgrade the Helm chart.