UNCLASSIFIED

Commit 3ee431f0 authored by Micah Nagel's avatar Micah Nagel 💰
Browse files

add docs and example

parent 63cbd2c6
Pipeline #299929 passed with stages
in 3 minutes and 8 seconds
...@@ -105,10 +105,12 @@ volumes: {} ...@@ -105,10 +105,12 @@ volumes: {}
# - name: ca-cert # - name: ca-cert
# secret: # secret:
# secretName: ca-secret # secretName: ca-secret
# defaultMode: 0644
volumeMounts: {} volumeMounts: {}
# - name: ca-cert # - name: ca-cert
# mountPath: /etc/ssl/certs # mountPath: /etc/ssl/certs
# readOnly: true
minio: minio:
install: false install: false
......
...@@ -77,3 +77,27 @@ helm upgrade -i mattermost chart -n mattermost --create-namespace -f my-values.y ...@@ -77,3 +77,27 @@ helm upgrade -i mattermost chart -n mattermost --create-namespace -f my-values.y
Role based authentication can be configured as long as you are on an enterprise version. Role based authentication can be configured as long as you are on an enterprise version.
Follow the steps in [this tutorial](https://docs.mattermost.com/deployment/advanced-permissions.html) to customize the permissions given to users. In general permissions can be edited under the "System Console -> User Management -> Permissions". Users should be created by default under the "Member" group, except for the first user to sign up or login. Follow the steps in [this tutorial](https://docs.mattermost.com/deployment/advanced-permissions.html) to customize the permissions given to users. In general permissions can be edited under the "System Console -> User Management -> Permissions". Users should be created by default under the "Member" group, except for the first user to sign up or login.
## OIDC Custom CA
Mattermost can be configured to point to specific files to trust with an OIDC auth connection, here is an example when using Big Bang to deploy mattermost, assuming you are populating a secret named "ca-cert" in the same namespace, with a key of cert.pem and value of a single PEM encoded certificate (an easy way to make this secret is included below as well):
```yaml
addons:
mattermost:
values:
volumes:
- name: ca-cert
secret:
secretName: ca-secret
defaultMode: 0644
volumeMounts:
- name: ca-cert
mountPath: /etc/ssl/certs
readOnly: true
```
For secret creation with this example and a pem file at `/path/to/cert.pem`:
```bash
kubectl create secret generic ca-secret --from-file=cert.pem=/path/to/cert.pem -n mattermost
```
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment