Join our No Code Enterprise RAG webinar

Reserve Your Spot

Creating an OIDC secret

We need the credentials form your SSO provider stored in a Kubernetes Secret i.e.

apiVersion: v1
kind: Secret
metadata:
  name: oidc-credentials
type: Opaque
data:
  client_id: <base64_encoded_client_id>
  client_secret: <base64_encoded_client_secret>
  issuer_url: <base64_encoded_issuer_url>

Integrating Single Sign On

apiVersion: bionic-gpt.com/v1
kind: Bionic
metadata:
  name: bionic-gpt
  namespace: bionic-gpt 
spec:

  ...
  
  # Single Sign ON
  sso-secret: oidc-credentials

  ...