The first example in README.md:
https://github.com/pingidentity/mod_auth_openidc/blob/master/README.md
gives a good starting point:
OIDCProviderMetadataURL https://accounts.google.com/.well-known/openid-configuration
OIDCClientID <your-client-id-administered-through-the-google-api-console>
OIDCClientSecret <your-client-secret-administered-through-the-google-api-console>
OIDCRedirectURI https://www.example.com/example/redirect_uri
OIDCCryptoPassphrase <password>
OIDCScope "openid email profile"
<Location /example/>
AuthType openid-connect
Require valid-user
Require claim hd:<your-domain>
</Location>
Normal http will work, trailing slashes will work (if they are used sequentially, as in the example), the certificate does not only need a fully qualified domain name, Debian packages work on Ubuntu 14.04.
The articles you mentioned also show how to configure Google on the side.
source
share