diff --git a/USERS.md b/USERS.md index b2fc75fc9286..bb7480e23c59 100644 --- a/USERS.md +++ b/USERS.md @@ -108,6 +108,7 @@ Currently, the following organizations are **officially** using Argo Workflows: 1. [SAS](https://www.sas.com/) 1. [Schlumberger](https://slb.com/) 1. [SegmentStream](https://segmentstream.com) +1. [Sendible](https://sendible.com) 1. [Sidecar Technologies](https://hello.getsidecar.com/) 1. [Softonic](https://hello.softonic.com/) 1. [Sohu](https://www.sohu.com/) diff --git a/docs/argo-server-sso.md b/docs/argo-server-sso.md index 3c2e053c42b4..e11eee6b3353 100644 --- a/docs/argo-server-sso.md +++ b/docs/argo-server-sso.md @@ -108,6 +108,18 @@ If no rule matches, we deny the user access. The precedence must be the lowest of all your service accounts. +## SSO Login Time + +> v2.12 and after + +By default, your SSO session will expire after 10 hours. You can change this by adding a sessionExpiry value to your [workflow-controller-configmap.yaml](workflow-controller-configmap.yaml) under the SSO heading. + + ```yaml + sso: + # Expiry defines how long your login is valid for in hours. (optional) + sessionExpiry: 240h + ``` + ## Sharing the Argo CD Dex Instance using Oauth2 It is possible to have the Argo Workflows Server use the Argo CD Dex instance for SSO, for instance if you use Okta with SAML which cannot integrate with Argo Workflows directly. In order to make this happen, you will need the following: @@ -149,6 +161,8 @@ What this might look like in your chart configuration: - --auth-mode=sso sso: issuer: https://argo-cd.mydomain.com/api/dex + # sessionExpiry defines how long your login is valid for in hours. (optional, default: 10h) + sessionExpiry: 240h clientId: name: argo-workflows-sso key: client-id diff --git a/docs/workflow-controller-configmap.yaml b/docs/workflow-controller-configmap.yaml index ec1a4c6c1f7f..501e3ab60d8b 100644 --- a/docs/workflow-controller-configmap.yaml +++ b/docs/workflow-controller-configmap.yaml @@ -267,6 +267,9 @@ data: sso: | # This is the root URL of the OIDC provider (required). issuer: https://issuer.root.url/ + # This defines how long your login is valid for (in hours). (optional) + # If omitted, defaults to 10h. Example below is 10 days. + sessionExpiry: 240h # This is name of the secret and the key in it that contain OIDC client # ID issued to the application by the provider (required). clientId: