You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For a complete overview of all configuration options, see the file [`auth_openidc.conf`](https://github.com/OpenIDC/mod_auth_openidc/blob/master/auth_openidc.conf).
37
37
This file can also serve as an include file for `httpd.conf`.
38
38
39
-
Interoperability
40
-
----------------
39
+
How to Use It
40
+
-------------
41
+
42
+
1. install and load `mod_auth_openidc.so` in your Apache server
43
+
1. set `OIDCRedirectURI` to a "vanity" URL within a location that is protected by mod_auth_openidc
44
+
1. configure a random password in `OIDCCryptoPassphrase` for session/state encryption purposes
45
+
1. configure `OIDCProviderMetadataURL` so it points to the Discovery metadata of your OpenID Connect Provider served on the `.well-known/openid-configuration` endpoint
46
+
1. register/generate a Client identifier and a secret with the OpenID Connect Provider and configure those in `OIDCClientID` and `OIDCClientSecret` respectively
47
+
1. register the `OIDCRedirectURI` configured above as the Redirect or Callback URI for your client at the Provider
48
+
1. configure your protected content/locations with `AuthType openid-connect`
For claims-based authorization with `Require claim:` directives see the [Wiki page on Authorization](https://github.com/OpenIDC/mod_auth_openidc/wiki/Authorization). For details on configuring multiple providers see the [Wiki](https://github.com/OpenIDC/mod_auth_openidc/wiki/Multiple-Providers).
Note if you want to securely restrict logins to a specific Google Apps domain you would not only
95
-
add the `hd=<your-domain>` setting to the `OIDCAuthRequestParams` primitive for skipping the Google Account
96
-
Chooser screen, but you must also ask for the `email` scope using `OIDCScope` and use a `Require claim`
97
-
authorization setting in the `Location` primitive similar to:
98
-
99
-
```apache
100
-
OIDCScope "openid email"
101
-
Require claim hd:<your-domain>
102
-
```
103
-
104
-
The above is an authorization example of an exact match of a provided claim against a string value.
105
-
For more authorization options see the [Wiki page on Authorization](https://github.com/OpenIDC/mod_auth_openidc/wiki/Authorization).
106
-
107
-
### Quickstart with a generic OpenID Connect Provider
108
-
109
-
1. install and load `mod_auth_openidc.so` in your Apache server
110
-
1. configure your protected content/locations with `AuthType openid-connect`
111
-
1. set `OIDCRedirectURI` to a "vanity" URL within a location that is protected by mod_auth_openidc
112
-
1. register/generate a Client identifier and a secret with the OpenID Connect Provider and configure those in `OIDCClientID` and `OIDCClientSecret` respectively
113
-
1. and register the `OIDCRedirectURI` as the Redirect or Callback URI with your client at the Provider
114
-
1. configure `OIDCProviderMetadataURL` so it points to the Discovery metadata of your OpenID Connect Provider served on the `.well-known/openid-configuration` endpoint
115
-
1. configure a random password in `OIDCCryptoPassphrase` for session/state encryption purposes
0 commit comments