docs/content/integration/openid-connect/clients/plesk/index.md
{{% oidc-common %}}
This example makes the following assumptions:
https://plesk.{{< sitevar name="domain" nojs="example.com" >}}/https://{{< sitevar name="subdomain-authelia" nojs="auth" >}}.{{< sitevar name="domain" nojs="example.com" >}}/pleskinsecure_secretSome of the values presented in this guide can automatically be replaced with documentation variables.
{{< sitevar-preferences >}}
The following example uses the OAuth login Extension which is assumed to be installed when following this section of the guide.
To install the OAuth login Extension for Plesk via the Web GUI:
Extensions.Extensions Catalog.OAuth login.The following YAML configuration is an example Authelia client configuration for use with Plesk which will operate with the application example:
identity_providers:
oidc:
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
## See: https://www.authelia.com/c/oidc
clients:
- client_id: 'plesk'
client_name: 'Plesk'
client_secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
public: false
authorization_policy: 'two_factor'
require_pkce: false
pkce_challenge_method: ''
redirect_uris:
- 'https://plesk.{{< sitevar name="domain" nojs="example.com" >}}/modules/oauth/public/login.php'
scopes:
- 'openid'
- 'email'
- 'profile'
response_types:
- 'code'
grant_types:
- 'authorization_code'
access_token_signed_response_alg: 'none'
userinfo_signed_response_alg: 'none'
token_endpoint_auth_method: 'client_secret_basic'
To configure Plesk there is one method, using the Web GUI.
To configure Plesk to utilize Authelia as an OpenID Connect 1.0 Provider, use the following instructions:
OpenID Connectpleskinsecure_secrethttps://plesk.{{< sitevar name="domain" nojs="example.com" >}}https://{{< sitevar name="subdomain-authelia" nojs="auth" >}}.{{< sitevar name="domain" nojs="example.com" >}}/api/oidc/authorizationhttps://{{< sitevar name="subdomain-authelia" nojs="auth" >}}.{{< sitevar name="domain" nojs="example.com" >}}/api/oidc/tokenhttps://{{< sitevar name="subdomain-authelia" nojs="auth" >}}.{{< sitevar name="domain" nojs="example.com" >}}/api/oidc/userinfoopenid,email,profileLogin with AutheliaSave at the bottom.