From c79b84c71c61b086712ff450123cbf6b6cd5a1f4 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Nicolas=20Mass=C3=A9?= Date: Fri, 12 Jul 2024 17:09:21 +0200 Subject: [PATCH] fix the remaining links without trailing slash --- content/english/blog/ansible-add-prefix-suffix-to-list.md | 2 +- .../blog/secure-openshift-4-openid-connect-authentication.md | 4 ++-- .../english/blog/secure-raspberry-pi-keycloak-gatekeeper.md | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/content/english/blog/ansible-add-prefix-suffix-to-list.md b/content/english/blog/ansible-add-prefix-suffix-to-list.md index 8e3e6cb..60831e4 100644 --- a/content/english/blog/ansible-add-prefix-suffix-to-list.md +++ b/content/english/blog/ansible-add-prefix-suffix-to-list.md @@ -7,7 +7,7 @@ topics: - IT Automation --- -Recently, in [one of my Ansible playbooks](../airgap-openshift-installation-move-registry-created-using-oc-adm-release-mirror-between-environments) I had to prefix all items of a list with a chosen string. +Recently, in [one of my Ansible playbooks](../airgap-openshift-installation-move-registry-created-using-oc-adm-release-mirror-between-environments/) I had to prefix all items of a list with a chosen string. diff --git a/content/english/blog/secure-openshift-4-openid-connect-authentication.md b/content/english/blog/secure-openshift-4-openid-connect-authentication.md index 014c4da..b6615c3 100644 --- a/content/english/blog/secure-openshift-4-openid-connect-authentication.md +++ b/content/english/blog/secure-openshift-4-openid-connect-authentication.md @@ -12,13 +12,13 @@ When searching for a definitive solution, it might be tempting to go for the ver But this is yet another password to remember! OpenShift can handle the [OpenID Connect](https://openid.net/connect/) protocol and thus offers Single Sign On to its users. -No additional password to remember: you can login to the OpenShift console with your [Google Account](../use-google-account-openid-connect-provider) for instance. +No additional password to remember: you can login to the OpenShift console with your [Google Account](../use-google-account-openid-connect-provider/) for instance. ## Pre-requisites -The rest of this article assumes you have already setup your OpenID Connect client in the Google Developer Console as explained in this article: [Use your Google Account as an OpenID Connect provider](../use-google-account-openid-connect-provider). +The rest of this article assumes you have already setup your OpenID Connect client in the Google Developer Console as explained in this article: [Use your Google Account as an OpenID Connect provider](../use-google-account-openid-connect-provider/). Then, create a secret in the **openshift-config** namespace containing the client secret generated by the Google Developer Console. diff --git a/content/english/blog/secure-raspberry-pi-keycloak-gatekeeper.md b/content/english/blog/secure-raspberry-pi-keycloak-gatekeeper.md index 91beaa4..89baac8 100644 --- a/content/english/blog/secure-raspberry-pi-keycloak-gatekeeper.md +++ b/content/english/blog/secure-raspberry-pi-keycloak-gatekeeper.md @@ -18,7 +18,7 @@ This article explains how to secure applications running on a Raspberry PI with [Keycloak Gatekeeper](https://github.com/keycloak/keycloak-gatekeeper) is a reverse proxy whose sole purpose is to authenticate the end-users using the [OpenID Connect](https://openid.net/connect/) protocol. If Keycloak Gatekeeper is best used in conjunction with the [Keycloak Identity Provider](https://www.keycloak.org/), it can also be used with any Identity Provider that conforms to the OpenID Connect specifications. -The rest of this article assumes you have already setup your OpenID Connect client in the Google Developer Console as explained in this article: [Use your Google Account as an OpenID Connect provider](../use-google-account-openid-connect-provider). +The rest of this article assumes you have already setup your OpenID Connect client in the Google Developer Console as explained in this article: [Use your Google Account as an OpenID Connect provider](../use-google-account-openid-connect-provider/). ## Compile Keycloak Gatekeeper