-
Couldn't load subscription status.
- Fork 2k
Add OIDC PKCE configuration through Policy #7765
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
done, updated PR text above |
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #7765 +/- ##
==========================================
+ Coverage 52.47% 52.49% +0.02%
==========================================
Files 90 90
Lines 21550 21581 +31
==========================================
+ Hits 11308 11330 +22
- Misses 9773 9778 +5
- Partials 469 473 +4 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
07acf0b to
b5c701a
Compare
9127a18 to
cb93a06
Compare
|
Also need to update the existing OIDC example and policy key in docs |
d86ff10 to
bafb76b
Compare
|
Closes #1782 |
|
Documentation for keycloak in the main doucmentation repo: nginx/documentation#585 |
b8a8c8b
c4bfa3f to
b8a8c8b
Compare
fff9b47 to
915e981
Compare
9cbb395 to
e4956a1
Compare
Proposed changes
Closes #6713
PKCEEnableproperty to theOIDCPolicy SpecPKCE flow oauth client requirements
In the test we use keycloak, so the info is specific to that, however please consult your oauth provider on how to set up a client that will use PKCE. For keycloak you need a client that is
S256Checklist
Before creating a PR, run through this checklist and mark each as complete.