relative path in OIDCProviderAuthorizationEndpoint #864
Replies: 2 comments 2 replies
-
|
I don't think that would be a solution: the module redirects to |
Beta Was this translation helpful? Give feedback.
-
|
thank you for the reply, i exactly know this works, keycloak is located on the same namespace and last kc versions can parse x-forwarded-host to construct correct url, if replace AP_INIT_TAKE1(OIDCProviderAuthorizationEndpoint, AP_INIT_TAKE1(OIDCProviderAuthorizationEndpoint, module allows relative path in OIDCProviderAuthorizationEndpoint and generates this reply curl -ki https://localhost i just want to know may be alternative solution is exists and do not require code modification thanks! |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
everything is works while we handle requests (web auth) to known public server address but this device can have multiple addresses and we don't know these addresses (because of proxies, forwarding tunnels, etc) , so, question:
ideal solution is relative path in OIDCProviderAuthorizationEndpoint (understand this is unsecure etc etc) but it is disabled explicitly in oidc_check_config_openid_openidc
any alternative solution ?
Beta Was this translation helpful? Give feedback.
All reactions