Skip to content

Commit e3baa25

Browse files
authored
Add TLS troubleshooting
1 parent 156830c commit e3baa25

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

README.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,16 @@ Any errors generated by the OpenID Connect flow are logged in a separate file, `
161161
* This is typically caused by the IdP issuing its own session cookie(s) to the client. NGINX Plus sends the request to the IdP for authentication and the IdP immediately sends back a new authorization code because the session is still valid.
162162
* Check your IdP configuration if this behavior is not desired.
163163

164+
* **Failed SSL/TLS handshake to IdP**
165+
* Indicated by error log messages including `peer closed connection in SSL handshake (104: Connection reset by peer) while SSL handshaking to upstream`.
166+
* This can occur when the IdP requires Server Name Indication (SNI) information as part of the TLS handshake. Additional configuration is required to satisfy this requirement.
167+
* Edit **openid_connect.server_conf** and for each of the `/_jwks_uri`, `/_token`, and `/_refresh` locations, add the following configuration snippet:
168+
```nginx
169+
proxy_set_header Host <IdP hostname>;
170+
proxy_ssl_name <IdP hostname>;
171+
proxy_ssl_server_name on;
172+
```
173+
164174
## Support
165175

166176
This reference implementation for OpenID Connect is supported for NGINX Plus subscribers.

0 commit comments

Comments
 (0)