This is an automated email from the ASF dual-hosted git repository.

github-bot pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/dolphinscheduler-website.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new e70bc4ed55 Automated deployment: 
cf6f3f14684149ec594108d81ec4859abae9115d
e70bc4ed55 is described below

commit e70bc4ed55bf64103504aaed32713fd2bf757a65
Author: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
AuthorDate: Mon Oct 20 05:07:21 2025 +0000

    Automated deployment: cf6f3f14684149ec594108d81ec4859abae9115d
---
 data/doc/en-us.json                                |   4 +-
 .../contribute/development-environment-setup.json  |   2 +-
 .../dev/guide/security/authentication-type.json    | 710 ++++++++++++++++++++-
 python/2.0.5/.buildinfo                            |   2 +-
 python/2.0.6/.buildinfo                            |   2 +-
 python/2.0.7/.buildinfo                            |   2 +-
 python/3.0.0/.buildinfo                            |   2 +-
 python/3.0.1/.buildinfo                            |   2 +-
 python/3.1.0/.buildinfo                            |   2 +-
 python/4.0.0/.buildinfo                            |   2 +-
 python/4.0.1/.buildinfo                            |   2 +-
 python/4.0.2/.buildinfo                            |   2 +-
 python/4.0.3/.buildinfo                            |   2 +-
 python/4.0.4/.buildinfo                            |   2 +-
 python/4.1.0/.buildinfo                            |   2 +-
 python/main/.buildinfo                             |   2 +-
 16 files changed, 707 insertions(+), 35 deletions(-)

diff --git a/data/doc/en-us.json b/data/doc/en-us.json
index c31c47839c..5ab499b331 100644
--- a/data/doc/en-us.json
+++ b/data/doc/en-us.json
@@ -39006,7 +39006,7 @@
     ]
   },
   {
-    "content": "Authentication Type\n\nSo far we support four authentication 
types, Apache DolphinScheduler password, LDAP, Casdoor SSO and OAuth2,the 
OAuth2 authorization login mode can be used with other authentication 
modes.\n\nChange Authentication 
Type\n\ndolphinscheduler-api/src/main/resources/application.yaml\n\nsecurity:\n 
 authentication:\n    # Authentication types (supported types: 
PASSWORD,LDAP,CASDOOR_SSO)\n    type: LDAP\n    # IF you set type `LDAP`, below 
config will be e [...]
+    "content": "Authentication Type\n\nSo far we support four authentication 
types, Apache DolphinScheduler password, LDAP, Casdoor SSO, OAuth2, and OIDC 
(OpenID Connect). The OAuth2 authorization login mode can be used with other 
authentication modes.\n\nChange Authentication 
Type\n\ndolphinscheduler-api/src/main/resources/application.yaml\n\nsecurity:\n 
 authentication:\n    # Authentication types (supported types: 
PASSWORD,LDAP,CASDOOR_SSO, OIDC)\n    type: LDAP\n    # IF you set type [...]
     "version": "dev",
     "link": "/guide/security/authentication-type",
     "title": "Authentication Type",
@@ -39407,7 +39407,7 @@
     ]
   },
   {
-    "content": "DolphinScheduler development\nSoftware Requirements\nBefore 
setting up the DolphinScheduler development environment, please make sure you 
have installed the software as below:\n\nGit\nJDK: v1.8+\nMaven: v3.5+\nNode: 
v16.0+\nPnpm: v8.0+ (Make sure pnpm is compatible with Node.js, see also: 
Compatibility)\n\nClone Git Repository\nDownload the git repository through 
your git management tool, here we use git-core as an example\nmkdir 
dolphinscheduler\ncd dolphinscheduler\ngit [...]
+    "content": "DolphinScheduler development\nSoftware Requirements\nBefore 
setting up the DolphinScheduler development environment, please make sure you 
have installed the software as below:\n\nGit\nJDK: v1.8+\nMaven: v3.5+\nNode: 
v16.0+\nPnpm: v8.0+ (Make sure pnpm is compatible with Node.js, see also: 
Compatibility)\n\nClone Git Repository\nDownload the git repository through 
your git management tool, here we use git-core as an example\nmkdir 
dolphinscheduler\ncd dolphinscheduler\ngit [...]
     "version": "dev",
     "link": "/contribute/development-environment-setup",
     "title": "DolphinScheduler development",
diff --git a/pages/doc/en-us/dev/contribute/development-environment-setup.json 
b/pages/doc/en-us/dev/contribute/development-environment-setup.json
index b51c0c1c91..7dc90f5b1d 100644
--- a/pages/doc/en-us/dev/contribute/development-environment-setup.json
+++ b/pages/doc/en-us/dev/contribute/development-environment-setup.json
@@ -1,5 +1,5 @@
 {
-  "__html": "<h1 id=\"dolphinscheduler-development\">DolphinScheduler 
development</h1>\n<h2 id=\"software-requirements\">Software 
Requirements</h2>\n<p>Before setting up the DolphinScheduler development 
environment, please make sure you have installed the software as 
below:</p>\n<ul>\n<li><a 
href=\"https://git-scm.com/downloads\";>Git</a></li>\n<li><a 
href=\"https://www.oracle.com/technetwork/java/javase/downloads/index.html\";>JDK</a>:
 v1.8+</li>\n<li><a href=\"http://maven.apache.org/dow [...]
+  "__html": "<h1 id=\"dolphinscheduler-development\">DolphinScheduler 
development</h1>\n<h2 id=\"software-requirements\">Software 
Requirements</h2>\n<p>Before setting up the DolphinScheduler development 
environment, please make sure you have installed the software as 
below:</p>\n<ul>\n<li><a 
href=\"https://git-scm.com/downloads\";>Git</a></li>\n<li><a 
href=\"https://www.oracle.com/technetwork/java/javase/downloads/index.html\";>JDK</a>:
 v1.8+</li>\n<li><a href=\"http://maven.apache.org/dow [...]
   "location": [
     "Contribution",
     "Development Environment Setup"
diff --git a/pages/doc/en-us/dev/guide/security/authentication-type.json 
b/pages/doc/en-us/dev/guide/security/authentication-type.json
index 4f93a9a088..e82d785429 100644
--- a/pages/doc/en-us/dev/guide/security/authentication-type.json
+++ b/pages/doc/en-us/dev/guide/security/authentication-type.json
@@ -1,5 +1,5 @@
 {
-  "__html": "<h1 id=\"authentication-type\">Authentication 
Type</h1>\n<ul>\n<li>So far we support four authentication types, Apache 
DolphinScheduler password, LDAP, Casdoor SSO and OAuth2,the OAuth2 
authorization login mode can be used with other authentication 
modes.</li>\n</ul>\n<h2 id=\"change-authentication-type\">Change Authentication 
Type</h2>\n<blockquote>\n<p>dolphinscheduler-api/src/main/resources/application.yaml</p>\n</blockquote>\n<pre><code
 class=\"language-yaml\"><span clas [...]
+  "__html": "<h1 id=\"authentication-type\">Authentication 
Type</h1>\n<ul>\n<li>So far we support four authentication types, Apache 
DolphinScheduler password, LDAP, Casdoor SSO, OAuth2, and OIDC (OpenID 
Connect). The OAuth2 authorization login mode can be used with other 
authentication modes.</li>\n</ul>\n<h2 id=\"change-authentication-type\">Change 
Authentication 
Type</h2>\n<blockquote>\n<p>dolphinscheduler-api/src/main/resources/application.yaml</p>\n</blockquote>\n<pre><code
 class=\"l [...]
   "location": [
     "Introduction to Functions",
     "Security",
@@ -11,33 +11,192 @@
       "children": [
         {
           "title": "Step1. Deploy Casdoor",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step1.-deploy-casdoor"
         },
         {
           "title": "Step2. Configure Casdoor Application",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step2.-configure-casdoor-application"
         },
         {
           "title": "Step3. Configure Dolphinscheduler",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step3.-configure-dolphinscheduler"
         },
         {
           "title": "Step1. Create Client Credentials",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step1.-create-client-credentials"
         },
         {
           "title": "Step2.Enable OAuth2 Login In The Api's Configuration File",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step2.enable-oauth2-login-in-the-api's-configuration-file"
         },
         {
           "title": "Step.3 Login With OAuth2",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step.3-login-with-oauth2"
+        },
+        {
+          "title": "Step 1. Enable OIDC in the API's Configuration File",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step-1.-enable-oidc-in-the-api's-configuration-file"
+        },
+        {
+          "title": "Step 2. Configure Your OIDC Provider (Keycloak Example)",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step-2.-configure-your-oidc-provider-(keycloak-example)"
+        },
+        {
+          "title": "Step 3. Login with OIDC",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step-3.-login-with-oidc"
         }
       ],
       "anchor": "change-authentication-type"
@@ -47,33 +206,192 @@
       "children": [
         {
           "title": "Step1. Deploy Casdoor",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step1.-deploy-casdoor"
         },
         {
           "title": "Step2. Configure Casdoor Application",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step2.-configure-casdoor-application"
         },
         {
           "title": "Step3. Configure Dolphinscheduler",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step3.-configure-dolphinscheduler"
         },
         {
           "title": "Step1. Create Client Credentials",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step1.-create-client-credentials"
         },
         {
           "title": "Step2.Enable OAuth2 Login In The Api's Configuration File",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step2.enable-oauth2-login-in-the-api's-configuration-file"
         },
         {
           "title": "Step.3 Login With OAuth2",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step.3-login-with-oauth2"
+        },
+        {
+          "title": "Step 1. Enable OIDC in the API's Configuration File",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step-1.-enable-oidc-in-the-api's-configuration-file"
+        },
+        {
+          "title": "Step 2. Configure Your OIDC Provider (Keycloak Example)",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step-2.-configure-your-oidc-provider-(keycloak-example)"
+        },
+        {
+          "title": "Step 3. Login with OIDC",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step-3.-login-with-oidc"
         }
       ],
       "anchor": "casdoor-sso"
@@ -83,36 +401,390 @@
       "children": [
         {
           "title": "Step1. Deploy Casdoor",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step1.-deploy-casdoor"
         },
         {
           "title": "Step2. Configure Casdoor Application",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step2.-configure-casdoor-application"
         },
         {
           "title": "Step3. Configure Dolphinscheduler",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step3.-configure-dolphinscheduler"
         },
         {
           "title": "Step1. Create Client Credentials",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step1.-create-client-credentials"
         },
         {
           "title": "Step2.Enable OAuth2 Login In The Api's Configuration File",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step2.enable-oauth2-login-in-the-api's-configuration-file"
         },
         {
           "title": "Step.3 Login With OAuth2",
-          "children": [],
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
           "anchor": "step.3-login-with-oauth2"
+        },
+        {
+          "title": "Step 1. Enable OIDC in the API's Configuration File",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step-1.-enable-oidc-in-the-api's-configuration-file"
+        },
+        {
+          "title": "Step 2. Configure Your OIDC Provider (Keycloak Example)",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step-2.-configure-your-oidc-provider-(keycloak-example)"
+        },
+        {
+          "title": "Step 3. Login with OIDC",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step-3.-login-with-oidc"
         }
       ],
       "anchor": "oauth2"
+    },
+    {
+      "title": "OIDC (OpenID Connect)",
+      "children": [
+        {
+          "title": "Step1. Deploy Casdoor",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step1.-deploy-casdoor"
+        },
+        {
+          "title": "Step2. Configure Casdoor Application",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step2.-configure-casdoor-application"
+        },
+        {
+          "title": "Step3. Configure Dolphinscheduler",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step3.-configure-dolphinscheduler"
+        },
+        {
+          "title": "Step1. Create Client Credentials",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step1.-create-client-credentials"
+        },
+        {
+          "title": "Step2.Enable OAuth2 Login In The Api's Configuration File",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step2.enable-oauth2-login-in-the-api's-configuration-file"
+        },
+        {
+          "title": "Step.3 Login With OAuth2",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step.3-login-with-oauth2"
+        },
+        {
+          "title": "Step 1. Enable OIDC in the API's Configuration File",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step-1.-enable-oidc-in-the-api's-configuration-file"
+        },
+        {
+          "title": "Step 2. Configure Your OIDC Provider (Keycloak Example)",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step-2.-configure-your-oidc-provider-(keycloak-example)"
+        },
+        {
+          "title": "Step 3. Login with OIDC",
+          "children": [
+            {
+              "title": "2.1. Easy setup using Pre-configured Realm Export:",
+              "children": [],
+              "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+            },
+            {
+              "title": "2.2. Using Custom configuration:",
+              "children": [],
+              "anchor": "2.2.-using-custom-configuration:"
+            },
+            {
+              "title": "2.3. If you have existing OIDC provider (Okta, Azure 
AD, Google, etc.)",
+              "children": [],
+              "anchor": 
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+            }
+          ],
+          "anchor": "step-3.-login-with-oidc"
+        }
+      ],
+      "anchor": "oidc-(openid-connect)"
     }
   ],
   "title": "Authentication Type",
diff --git a/python/2.0.5/.buildinfo b/python/2.0.5/.buildinfo
index c721eddf7f..1759f76b06 100644
--- a/python/2.0.5/.buildinfo
+++ b/python/2.0.5/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: 6effbffeb934c5b0d33c615744d1bf5a
+config: 9ab37b1b7f419b97e08c7ea828c059a2
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/2.0.6/.buildinfo b/python/2.0.6/.buildinfo
index 7d1bd73661..379373386a 100644
--- a/python/2.0.6/.buildinfo
+++ b/python/2.0.6/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: 6c763b0786eba85fc7645638fde572a5
+config: e0e0cc0bae3902b226afd734651f2a6a
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/2.0.7/.buildinfo b/python/2.0.7/.buildinfo
index 4b076b82d4..8e9d2caae0 100644
--- a/python/2.0.7/.buildinfo
+++ b/python/2.0.7/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: b80171d71e3b7bb4b2e3063c9ff32da1
+config: 53ebfb40b865339fe558686fff1a8887
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/3.0.0/.buildinfo b/python/3.0.0/.buildinfo
index 4fd962527b..839cd041eb 100644
--- a/python/3.0.0/.buildinfo
+++ b/python/3.0.0/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: 6fdf0e43c50b1aba9c35afd497b04fe7
+config: 7e574c318bff49560e6171ff18d85c5d
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/3.0.1/.buildinfo b/python/3.0.1/.buildinfo
index 519e6c56fe..3aca0767ab 100644
--- a/python/3.0.1/.buildinfo
+++ b/python/3.0.1/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: 1249ce8068896b0b36984841fc973659
+config: 52cb30c8ab156e7bfbba77e13a40d938
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/3.1.0/.buildinfo b/python/3.1.0/.buildinfo
index c0f868a6ec..9d2f72aa27 100644
--- a/python/3.1.0/.buildinfo
+++ b/python/3.1.0/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: 5af421d0f51702607d21c924f799e4d1
+config: 957a88d6820a4ca63badbbc6f849b2c7
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/4.0.0/.buildinfo b/python/4.0.0/.buildinfo
index 528a50e5b1..19279b6f44 100644
--- a/python/4.0.0/.buildinfo
+++ b/python/4.0.0/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: a2eb0b6dd39fda8d8332ef022608bb1a
+config: b375bc5ea911887ad9450a1623039a8b
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/4.0.1/.buildinfo b/python/4.0.1/.buildinfo
index b9a3ff228e..16b7052870 100644
--- a/python/4.0.1/.buildinfo
+++ b/python/4.0.1/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: 40c5f46c47b32f536a6d3533109d89e4
+config: f98ef86c7ca8314d388ac730affe30b8
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/4.0.2/.buildinfo b/python/4.0.2/.buildinfo
index 55a57c10a1..0549c4b4a6 100644
--- a/python/4.0.2/.buildinfo
+++ b/python/4.0.2/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: f9f269432eb06d3c89850c20137ef44b
+config: 8a968477033d767ff91a9fefb9f36f20
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/4.0.3/.buildinfo b/python/4.0.3/.buildinfo
index 939ecb4966..083ca00af4 100644
--- a/python/4.0.3/.buildinfo
+++ b/python/4.0.3/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: 7ef3dd0a1fcd16cede6e20a3313a8e2a
+config: e2d1bb94fd3cdef656ec73c946d1ee9c
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/4.0.4/.buildinfo b/python/4.0.4/.buildinfo
index 62f9f74349..8d2da2c239 100644
--- a/python/4.0.4/.buildinfo
+++ b/python/4.0.4/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: 58fb5378b3a93c2d91a1c7265b4b74da
+config: 265b0a37b1b62952ef8a37dceaa2723f
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/4.1.0/.buildinfo b/python/4.1.0/.buildinfo
index f52ee31942..7c6c9c0c86 100644
--- a/python/4.1.0/.buildinfo
+++ b/python/4.1.0/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: 01d4ff86372e2808c71a84657b7ae5e5
+config: 3c78e8aa01972b3f475c236398e578de
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/main/.buildinfo b/python/main/.buildinfo
index 3db2c48b13..e13e5c1f3f 100644
--- a/python/main/.buildinfo
+++ b/python/main/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: fbede4401ea0dae496925ca406dd781e
+config: a2d1da368c9f0f5bf2533db2b004758c
 tags: 645f666f9bcd5a90fca523b33c5a78b7


Reply via email to