[Feature] Allow up to a few HTTP redirects while resolving SSO well-known configuration #20994
Replies: 2 comments
-
Followup when allowing redirects, there are some more validations that fail.
|
Beta Was this translation helpful? Give feedback.
-
Looks like this is against open-id standards; |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I have searched the existing feature requests, both open and closed, to make sure this is not a duplicate request.
The feature
Context
I'm experimenting with a HTTP-based (not IP-anycast) load-balanced single sign-on provider. The effect is that clients are redirected from a generic URL to a specific URL eg,
idm.mydomain.example into nuremberg.idm.mydomain.example.
Reproduction
Launch Immich-server with a single sign-on configuration that validates but doesn't have to work end-to-end.
Fill in a URL that replies with an HTTP redirect into the setting
oauth.issuerUrl
eg,oauth.issuerUrl = "https://idm.mydomain.example/<whatever the client-id>/.well-known/openid-configuration";
In the web-server configuration, setup an HTTP redirect (status code 3XX) for host
idm.mydomain.example
tonuremberg.idm.mydomain.example
with retention of path and parameters/arguments.Behaviour
Immich starts the single sign-on process requesting
https://idm.mydomain.example/<whatever the client-id>/.well-known/openid-configuration
but the server replies with a redirect. Immich then fails the process.Systemd log excerpt
Example HTTP response
Expected behaviour / feature request
Is it possible to make Immich follow redirects for the openid-configuration file URL? Maybe something like 'up to 3' or so?
Further discussion; the paths returned inside the openid-configuration file might also be generic and must be followed eg,
userinfo_endpoint: "https://idm.mydomain.example/<whatever the client-id>/userinfo"
into "https://nuremberg.idm.mydomain.example//userinfo"Platform
Beta Was this translation helpful? Give feedback.
All reactions