From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: <pve-devel-bounces@lists.proxmox.com> Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) by lore.proxmox.com (Postfix) with ESMTPS id D04291FF168 for <inbox@lore.proxmox.com>; Tue, 4 Mar 2025 15:50:19 +0100 (CET) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 7A1972951; Tue, 4 Mar 2025 15:50:14 +0100 (CET) From: Shannon Sterz <s.sterz@proxmox.com> To: pve-devel@lists.proxmox.com Date: Tue, 4 Mar 2025 15:49:27 +0100 Message-Id: <20250304144927.235339-1-s.sterz@proxmox.com> X-Mailer: git-send-email 2.39.5 MIME-Version: 1.0 X-SPAM-LEVEL: Spam detection results: 0 AWL -0.013 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DMARC_MISSING 0.1 Missing DMARC policy KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment RCVD_IN_VALIDITY_CERTIFIED_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_VALIDITY_RPBL_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_VALIDITY_SAFE_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record Subject: [pve-devel] [PATCH docs v2] pveum: switch OATH 2.0 to the correct OAuth 2.0; use pve not Proxmox X-BeenThere: pve-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox VE development discussion <pve-devel.lists.proxmox.com> List-Unsubscribe: <https://lists.proxmox.com/cgi-bin/mailman/options/pve-devel>, <mailto:pve-devel-request@lists.proxmox.com?subject=unsubscribe> List-Archive: <http://lists.proxmox.com/pipermail/pve-devel/> List-Post: <mailto:pve-devel@lists.proxmox.com> List-Help: <mailto:pve-devel-request@lists.proxmox.com?subject=help> List-Subscribe: <https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel>, <mailto:pve-devel-request@lists.proxmox.com?subject=subscribe> Reply-To: Proxmox VE development discussion <pve-devel@lists.proxmox.com> Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: pve-devel-bounces@lists.proxmox.com Sender: "pve-devel" <pve-devel-bounces@lists.proxmox.com> this switches the use of OATH 2.0 to the correct spelling of OAuth 2.0. it also makes it clear that the OpenID Connect Discovery protocol is used by Proxmox VE the product, not Proxmox the company. otherwise, users could have gotten the impression that data is processed on company servers. Signed-off-by: Shannon Sterz <s.sterz@proxmox.com> --- pveum.adoc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pveum.adoc b/pveum.adoc index 81565ab..0cc267e 100644 --- a/pveum.adoc +++ b/pveum.adoc @@ -160,7 +160,7 @@ as an authentication protocol. OpenID Connect:: -OpenID Connect is implemented as an identity layer on top of the OATH 2.0 +OpenID Connect is implemented as an identity layer on top of the OAuth 2.0 protocol. It allows clients to verify the identity of the user, based on authentication performed by an external authorization server. @@ -436,7 +436,7 @@ OpenID Connect The main OpenID Connect configuration options are: * `Issuer URL` (`issuer-url`): This is the URL of the authorization server. -Proxmox uses the OpenID Connect Discovery protocol to automatically configure +{pve} uses the OpenID Connect Discovery protocol to automatically configure further details. + While it is possible to use unencrypted `http://` URLs, we strongly recommend to -- 2.39.5 _______________________________________________ pve-devel mailing list pve-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel