Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

website/integrations: add outline knowledge base #8786

Merged
46 changes: 46 additions & 0 deletions website/integrations/services/outline/index.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
---
title: Outline
---

<span class="badge badge--secondary">Support level: Community</span>

## What is Outline

> Your team's knowledge base.
> Lost in a mess of Docs? Never quite sure who has access? Colleagues requesting the same information repeatedly in chat? It’s time to get your team’s knowledge organized.
>
> -- https://www.getoutline.com

## Preparation

The following placeholders will be used:

- `outline.company` is the FQDN of the Outline install.
- `authentik.company` is the FQDN of the authentik install.

Create an OAuth2/OpenID provider with the following parameters:

- Client Type: `Confidential`
- Scopes: OpenID, Email and Profile
- Signing Key: Select any available key
- Redirect URIs: `https://outline.company/auth/oidc.callback`

Note the Client ID and Client Secret values.

## Outline

You need to set the following `env` Variables for Docker based installations.

Set the following values:

```yaml
OIDC_CLIENT_ID=
OIDC_CLIENT_SECRET=
OIDC_AUTH_URI=https://authentik.company/application/o/authorize/
OIDC_TOKEN_URI=https://authentik.company/application/o/token/
OIDC_USERINFO_URI=https://authentik.company/application/o/userinfo/
OIDC_LOGOUT_URI=https://authentik.company/application/o/wiki/end-session/
OIDC_USERNAME_CLAIM=preferred_username
OIDC_DISPLAY_NAME=authentik
OIDC_SCOPES=openid profile email
```
Loading