K

GitHub Integration

This document will outline both the GitHub setup process as well as the MikroCloud setup process in order to get you on your feet quickly.

GitHub OAuth 2 Setup

Step 1: Log into your GitHub Profile

  1. Log into your GitHub Profile, and then navigate to the following url:
    https://github.com/settings/developers
  2. You will see the following page, or a page similar to the one shown below.

picture 0

Step 2: Create the new OAuth Application

  1. On the OAuth creation page, click on the New OAuth App button, this will start the configuration for the GitHub setup.

picture 1

  1. You will be taken to a new page, which will allow you fill out some information and set up the application.
SettingDescription
Application NameGive your application a name, this will be shown to your users when they authenticate with the portal.
Homepage URLThis will be the full URL to your application's URL.
(In our example we have put the full URL for MikroCloud's home page.).
Application descriptionThis is a short description that will be shown to all users of your application.
Authorization callback URLThis is MikroCloud's callback URL, which is the following:

https://captive.mkcld.io/callback
Enable Device FlowYou can enable this option by ticking the tickbox, this will allow the OAuth app to authorize users via the GitHub Device Flow.

picture 2

  1. When you have entered all of the information needed, you can then continue by clicking on the Register application button at the bottom of this page.

Step 3: Configure the GitHub OAuth application

  1. Once you have clicked on the Register application button in the previous step, you will then be taken to a new GitHub page showing a bit more information.

picture 3

  1. Within the Client secrets section, to the right, you will see a button labeled Generate a new client secret; you can click on that button in order to create a new client secret.
  2. After clicking on the Generate a new client secret button, you will be asked to authenticate with GitHub using MFA or other methods in order to create the new client secret.
  3. When you have successfully authenticated, you will then be taken back to the previous page which showed the application details.

picture 4

  1. After you have saved your client secret somewhere, you can then proceed to click on the small Update application button at the bottom of this page. This will apply all outstanding settings.

You have successfully set up the GitHub side of this IDP integration, we can now move on to the MikroCloud setup.


MikroCloud IDP Setup

Once you have set up the GitHub side of the Identity provider, you can now continue to set up the MikroCloud side of this integration, follow along with the steps below.

Step 1: Navigate to your Identity Providers

  1. From your MikroCloud Dashboard, navigate to Settings -> Identity Providers, this will take you to the Overview page for the Identity Providers setting.

picture 10

  1. Once you are on the Identity Providers Overview page, you can click on the `Get Started button at the top of the page.

picture 11

Step 2: Create your IDP Integration

  1. Once you have clicked on the Get Started button, a new widget will pop up which will allow you to configure your IDP settings.

picture 13

  1. Fill out the following information into your configuration widget.
OptionDescription
NameGive your Integration a descriptive and unique name.
Identity ProviderUsing the dropdown menu, select GitHub as the IDP.
Client IDPaste your previously saved Client ID into this textbox.
Client SecretPaste your previously saved Client Secret into this textbox.

picture 5

  1. Once you have filled in all of the required information, you can then continue by clicking on the Save button at the bottom of this page.
  2. Give the system a few moments to initialize and create the IDP integration.

You have successfully set up the GitHub integration, you can now continue by creating a Captive Portal Instance to use with your integration.


Was this page helpful?