Skip to content

Commit 9f6a79b

Browse files
Update oidc-provider.md
1 parent b0c0e7e commit 9f6a79b

File tree

1 file changed

+2
-2
lines changed
  • content/en/docs/appstore/use-content/platform-supported-content/services

1 file changed

+2
-2
lines changed

content/en/docs/appstore/use-content/platform-supported-content/services/oidc-provider.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -573,12 +573,12 @@ In versions of the OIDC Provider above 2.0.0, the sub value was changed from an
573573

574574
### Infinite Loop of Redirects
575575

576-
The OIDC Provider service sets a cookie as a means to persist the session in the user’s browser. If the cookie is not properly set, this may lead to problems. For example, when the OIDC Provider service is used to build an IAM Broker, no session is established and the broker may initiate a new session at the upstream IdP, which results in an ‘infinite loop’ of redirects via the users browser.
576+
The OIDC Provider service sets a cookie as a means to persist the session in the user’s browser. If the cookie is not properly set, this may lead to problems. For example, when the OIDC Provider service is used to build an IAM Broker, no session is established and the broker may initiate a new session at the upstream IdP, which results in an ‘infinite loop’ of redirects via the user's browser.
577577
To ensure the cookie is properly set, the runtime setting com.mendix.core.SameSiteCookies must have value None. See [Environment Details](/developerportal/deploy/environments-details/#samesite) for more information how to set the correct value for SameSite runtime setting. Note that the default value for this setting changed in [Mendix 8.11](/releasenotes/studio-pro/8.11/).
578578

579579
### On-premise Deployment and IIS
580580

581-
When implementing the OIDC Provider service in an on-premise deployment scenario and allowing users to navigate freely between applications, there is an additional setting in IIS that must be configured that is not normally changed for a regular on-premise deployment. Without making this update, when users are already logged in (have the cookie) and they navigate to one of the applications that would need to authenticate with the Provider service, a redirect for authentication will fail because IIS will rewrite the host in the response header resulting in request attempting to authenticate on itself for authentication instead of the Provider service. This is because of a default setting on the Application Request Routing proxy server that is set up in IIS for on-premise deployments. You must disable the "Reverse rewrite host in response header" checkbox under IIS > Server > Application Request Routing > Proxy Settings to prevent this from happening.
581+
In an on-premise deployment scenario, if you want to allow users to navigate freely between applications, you must unselect the **Reverse rewrite host in response header** check box in IIS, under **IIS** > **Server** > **Application Request Routing** > **Proxy Settings**. If you leave this option enabled, redirects for authentication fail for users who are already logged in (have the cookie) if they navigate to one of the applications that would need to authenticate with the Provider service. This issue happens because IIS rewrites the host in the response header, resulting the in request attempting to authenticate on itself for authentication instead of the Provider service.
582582

583583
## Authorization{#authorization}
584584

0 commit comments

Comments
 (0)