website/integrations: Add offline_access scope for WordPress (#11274)

* Add offline_access scope

Signed-off-by: Gonçalo Pereira <goncalo_pereira@outlook.pt>

* Typo

Signed-off-by: Gonçalo Pereira <goncalo_pereira@outlook.pt>

* Added Scopes needed by Wordpress to Authentik config docs

Signed-off-by: Gonçalo Pereira <goncalo_pereira@outlook.pt>

* Update website/integrations/services/wordpress/index.md

Co-authored-by: Tana M Berry <tanamarieberry@yahoo.com>
Signed-off-by: Gonçalo Pereira <goncalo_pereira@outlook.pt>

* Apply suggestions from code review

Signed-off-by: Jens L. <jens@beryju.org>

---------

Signed-off-by: Gonçalo Pereira <goncalo_pereira@outlook.pt>
Signed-off-by: Jens L. <jens@beryju.org>
Co-authored-by: Tana M Berry <tanamarieberry@yahoo.com>
Co-authored-by: Jens L. <jens@beryju.org>
This commit is contained in:
Gonçalo Pereira
2024-09-11 11:44:36 +01:00
committed by GitHub
parent 65166e8a2a
commit 20552dc899

View File

@ -38,6 +38,7 @@ Only settings that have been modified from default have been listed.
- Client ID: Copy and Save this for Later
- Client Secret: Copy and Save this for later
- Redirect URIs/Origins: `https://wp.company/wp-admin/admin-ajax.php\?action=openid-connect-authorize`
- Scopes: _email_, _offline_access_, _openid_, _profile_
### Step 2 - WordPress
@ -54,12 +55,16 @@ Only settings that have been modified from default have been listed.
- Login Type: OpenID Connect Button on Login (This option display a button to login using OpenID as well as local WP login)
- Client ID: Client ID from step 1
- Client Secret: Client Secret from step 1
- OpenID Scope: `email profile openid`
- OpenID Scope: `email profile openid offline_access`
- Login Endpoint URL: `https://authentik.company/application/o/authorize/`
- Userinfo Endpoint URL: `https://authentik.company/application/o/userinfo/`
- Token Validation Endpoint URL: `https://authentik.company/application/o/token/`
- End Session Endpoint URL: `https://authentik.company/application/o/wordpress/end-session/`
:::note
Make sure to include the _offline_access_ scope to ensure refresh tokens are generated. Otherwise your session will expire and force users to manually log in again. Refer to the [OpenID Connect Core specification](https://openid.net/specs/openid-connect-core-1_0.html#OfflineAccess) for more information.
:::
:::note
Review each setting and choose the ones that you require for your installation. Examples of popular settings are _Link Existing Users_, _Create user if does not exist_, and _Enforce Privacy_
:::