website/integrations: Add offline_access scope for WordPress (#11274)
* Add offline_access scope Signed-off-by: Gonçalo Pereira <goncalo_pereira@outlook.pt> * Typo Signed-off-by: Gonçalo Pereira <goncalo_pereira@outlook.pt> * Added Scopes needed by Wordpress to Authentik config docs Signed-off-by: Gonçalo Pereira <goncalo_pereira@outlook.pt> * Update website/integrations/services/wordpress/index.md Co-authored-by: Tana M Berry <tanamarieberry@yahoo.com> Signed-off-by: Gonçalo Pereira <goncalo_pereira@outlook.pt> * Apply suggestions from code review Signed-off-by: Jens L. <jens@beryju.org> --------- Signed-off-by: Gonçalo Pereira <goncalo_pereira@outlook.pt> Signed-off-by: Jens L. <jens@beryju.org> Co-authored-by: Tana M Berry <tanamarieberry@yahoo.com> Co-authored-by: Jens L. <jens@beryju.org>
This commit is contained in:
@ -38,6 +38,7 @@ Only settings that have been modified from default have been listed.
|
||||
- Client ID: Copy and Save this for Later
|
||||
- Client Secret: Copy and Save this for later
|
||||
- Redirect URIs/Origins: `https://wp.company/wp-admin/admin-ajax.php\?action=openid-connect-authorize`
|
||||
- Scopes: _email_, _offline_access_, _openid_, _profile_
|
||||
|
||||
### Step 2 - WordPress
|
||||
|
||||
@ -54,12 +55,16 @@ Only settings that have been modified from default have been listed.
|
||||
- Login Type: OpenID Connect Button on Login (This option display a button to login using OpenID as well as local WP login)
|
||||
- Client ID: Client ID from step 1
|
||||
- Client Secret: Client Secret from step 1
|
||||
- OpenID Scope: `email profile openid`
|
||||
- OpenID Scope: `email profile openid offline_access`
|
||||
- Login Endpoint URL: `https://authentik.company/application/o/authorize/`
|
||||
- Userinfo Endpoint URL: `https://authentik.company/application/o/userinfo/`
|
||||
- Token Validation Endpoint URL: `https://authentik.company/application/o/token/`
|
||||
- End Session Endpoint URL: `https://authentik.company/application/o/wordpress/end-session/`
|
||||
|
||||
:::note
|
||||
Make sure to include the _offline_access_ scope to ensure refresh tokens are generated. Otherwise your session will expire and force users to manually log in again. Refer to the [OpenID Connect Core specification](https://openid.net/specs/openid-connect-core-1_0.html#OfflineAccess) for more information.
|
||||
:::
|
||||
|
||||
:::note
|
||||
Review each setting and choose the ones that you require for your installation. Examples of popular settings are _Link Existing Users_, _Create user if does not exist_, and _Enforce Privacy_
|
||||
:::
|
||||
|
Reference in New Issue
Block a user