# Override the minio service name for easier connection setup
service:
nameOverride:"minio.mattermost.svc.cluster.local"
tenants:
tenants:
secrets:
secrets:
name:"mattermost-objstore-creds"
name:"mattermost-objstore-creds"
accessKey:"minio"
accessKey:"minio"
secretKey:"minio#123"# default key, change this!
secretKey:"minio123"# default key, change this!
postgresql:
postgresql:
install:false
install:false
...
@@ -167,3 +188,5 @@ elasticsearch:
...
@@ -167,3 +188,5 @@ elasticsearch:
enablesearching:true
enablesearching:true
# When true, Elasticsearch will be used for all autocompletion queries on users and channels using the latest index. Autocompletion results may be incomplete until a bulk index of the existing users and channels database is finished. When false, database autocomplete is used.
# When true, Elasticsearch will be used for all autocompletion queries on users and channels using the latest index. Autocompletion results may be incomplete until a bulk index of the existing users and channels database is finished. When false, database autocomplete is used.
Role based authentication can be configured as long as you are on an enterprise version.
Role based authentication can be configured as long as you are on an enterprise version.
Follow the steps in [this tutorial](https://docs.mattermost.com/deployment/advanced-permissions.html) to customize the permissions given to users. In general permissions can be edited under the "System Console -> User Management -> Permissions". Users should be created by default under the "Member" group, except for the first user to sign up or login.
Follow the steps in [this tutorial](https://docs.mattermost.com/deployment/advanced-permissions.html) to customize the permissions given to users. In general permissions can be edited under the "System Console -> User Management -> Permissions". Users should be created by default under the "Member" group, except for the first user to sign up or login.
## OIDC Custom CA
Mattermost can be configured to point to specific files to trust with an OIDC auth connection, here is an example when using Big Bang to deploy mattermost, assuming you are populating a secret named "ca-cert" in the same namespace, with a key of cert.pem and value of a single PEM encoded certificate (an easy way to make this secret is included below as well):
```yaml
addons:
mattermost:
values:
volumes:
-name:ca-cert
secret:
secretName:ca-secret
defaultMode:0644
volumeMounts:
-name:ca-cert
mountPath:/etc/ssl/certs
readOnly:true
```
For secret creation with this example and a pem file at `/path/to/cert.pem`: