diff --git a/docs/content/configuration.md b/docs/content/configuration.md index 7f5f97b26..e216f574c 100644 --- a/docs/content/configuration.md +++ b/docs/content/configuration.md @@ -211,6 +211,11 @@ these are rarely used for various reasons. | | `CMD_OAUTH2_ROLES_CLAIM` | **no default**, `roles` | ID token claim, which is supposed to provide an array of strings of roles | | | `CMD_OAUTH2_ACCESS_ROLE` | **no default**, `role/hedgedoc` | The role which should be included in the ID token roles claim to grant access | +!!! info + If you are using a [CA not trusted by Node.js](https://github.com/nodejs/node/issues/4175) (like Let's Encrypt e.g) for your OAuth2 provider you can set the [`NODE_EXTRA_CA_CERTS`](https://nodejs.org/api/cli.html#cli_node_extra_ca_certs_file) environment variable to the CA certificate file path of your CA. + Remember to also make the file available inside the Docker container, if you're running HedgeDoc in Docker container. + + ### SAML Login | config file | environment | **default** and example value | description | diff --git a/docs/content/guides/auth/nextcloud.md b/docs/content/guides/auth/nextcloud.md index 7e1a2fb50..7010d2b5f 100644 --- a/docs/content/guides/auth/nextcloud.md +++ b/docs/content/guides/auth/nextcloud.md @@ -59,3 +59,7 @@ successfully with Nextcloud 14 and Nextcloud 20). CMD_OAUTH2_USER_PROFILE_DISPLAY_NAME_ATTR=ocs.data.display-name CMD_OAUTH2_USER_PROFILE_EMAIL_ATTR=ocs.data.email ``` + +!!! info + If you are using a [CA not trusted by Node.js](https://github.com/nodejs/node/issues/4175) (like Let's Encrypt e.g) for your NextCloud instance you can set the [`NODE_EXTRA_CA_CERTS`](https://nodejs.org/api/cli.html#cli_node_extra_ca_certs_file) environment variable to the CA certificate file path of your CA. + Remember to also make the file available inside the Docker container, if you're running HedgeDoc in Docker container.