diff --git a/helmchart/single-sign-on/values.yaml b/helmchart/single-sign-on/values.yaml index 24172e7ba8b57b69c6a1fc3c36394d4d90014cb3..9212b893ca3fdc227477f96de87062a234d9085c 100644 --- a/helmchart/single-sign-on/values.yaml +++ b/helmchart/single-sign-on/values.yaml @@ -164,7 +164,7 @@ kratos: selfservice: # TODO: Have to figure out a decent default - default_browser_return_url: https://stackspin.net + default_browser_return_url: http://localhost/login/login methods: link: @@ -181,6 +181,9 @@ kratos: login: ui_url: http://localhost/login/login + settings: + ui_url: http://localhost/login/settings + registration: ui_url: http://localhost/login/registration @@ -223,11 +226,11 @@ hydra: issuer: https://sso.stackspin.example.net # hydra.hydra.config.urls.login is the uri that users are redirect to perform the # login operation. The FQDN used here needs to match the value of singleSignOnHost - login: https://sso.stackspin.example.net/login + login: https://sso.stackspin.example.net/login/auth # hydra.hydra.config.urls.consent is the uri that users are redirect to trigger # the consent/permission check. The FQDN used here needs to match the value of # singleSignOnHost - consent: https://sso.stackspin.example.net/consent + consent: https://sso.stackspin.example.net/login/consent secrets: # hydra.hydra.config.secret is used as a seed whenever cryptographic operations are # performed by hydra i.e. creation of a token.