Replies: 3 comments
-
|
there should be an OIDC token endpoint in the provider.json, not an OAuth introspection endpoint |
Beta Was this translation helpful? Give feedback.
-
|
Thank you.
=> Match the debug log line Next problem though:
Earlier in the log: Double-encoding happens which break the already encoded code. (Codepath : So here I'm stuck. Now regarding actual authentication... For auth, their module is providing an auth provider. So the Apparently, there is no mention of subrequest-authentication (which sounds nice at first glance), so I'll rather reproduce the NB: I couldn't find a |
Beta Was this translation helpful? Give feedback.
-
|
the parameter encoding issue turns out to be a bug in liboauth2, fixed in OpenIDC/liboauth2@6da0bad just; would you be able to confirm by building from source? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Dear, I've been through the challenging process of configuring this module. (I've been an fan of
mod_auth_openidcfor the past 8 years).After going back & forth with the source-code I ended-up with:
$ cat provider.json{ "issuer": "https://accounts.google.com", "authorization_endpoint": "https://accounts.google.com/o/oauth2/v2/auth", "introspection_endpoint": "https://www.googleapis.com/oauth2/v4/token", "introspect.token_param_name": "access_token" }location blockOpenIDCProvider file /etc/nginx/conf.d/provider.json; OpenIDCClient string unauth_action=auth&state.cookie.name.prefix=&client_id=blablablaapps.googleusercontent.com&client_secret=xxx&scope=openid%20email&token_endpoint_auth_method=client_secret_basic ssl_verify=false; OpenIDCClaim sub $pfc_claim_sub; proxy_set_header OAUTH2_CLAIM_sub $pfc_claim_sub;Google console redirect URI configured to
<my-domain>/openid-connect/redirect_uriNow I'm looking for the equivalent of:
But even before I get to authorization, I've a preliminary problem regarding authentication which happens when I hit the redirect URI:
As you can see, a
000HTTP code is returned (nothing in the error log). More exactly, no HTTP code is returned:Some warning, but nothing relevant related to this particular failure:
This is somehow expected because
oauth2_openidc_handleis really under-logged with manygoto end;codepaths not triggering logging.With debug-level:
Ok,
oauth2_openidc_handle: return: 0but I still can't figure why.At that stage, any hint would be welcome to finalize the setup.
Other probably unrelated and non-blocking problems encountered on the way but worth mentioning though:
_oauth2_openidc_cookie_valid: state cookie could not be retrieved/decoded, but I'd like to go without state cookie for now. Sadly,oauth2_cfg_openidc_state_cookie_name_prefix_get()makes impossible to set it NULL and avoid this warning.no crypto passphrase configured, generating one, but no configuration allows for it (also note that this shows up in the log even afteroauth2_openidc_handlefailed)Beta Was this translation helpful? Give feedback.
All reactions