Replies: 3 comments
-
there should be an OIDC token endpoint in the provider.json, not an OAuth introspection endpoint |
Beta Was this translation helpful? Give feedback.
-
Thank you.
=> Match the debug log line Next problem though:
Earlier in the log:
Double-encoding happens which break the already encoded code. (Codepath : So here I'm stuck. Now regarding actual authentication... For auth, their module is providing an auth provider.
So the Apparently, there is no mention of subrequest-authentication (which sounds nice at first glance), so I'll rather reproduce the NB: I couldn't find a |
Beta Was this translation helpful? Give feedback.
-
the parameter encoding issue turns out to be a bug in liboauth2, fixed in OpenIDC/liboauth2@6da0bad just; would you be able to confirm by building from source? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Dear, I've been through the challenging process of configuring this module. (I've been an fan of
mod_auth_openidc
for the past 8 years).After going back & forth with the source-code I ended-up with:
$ cat provider.json
location block
Google console redirect URI configured to
<my-domain>/openid-connect/redirect_uri
Now I'm looking for the equivalent of:
But even before I get to authorization, I've a preliminary problem regarding authentication which happens when I hit the redirect URI:
As you can see, a
000
HTTP code is returned (nothing in the error log). More exactly, no HTTP code is returned:Some warning, but nothing relevant related to this particular failure:
This is somehow expected because
oauth2_openidc_handle
is really under-logged with manygoto end;
codepaths not triggering logging.With debug-level:
Ok,
oauth2_openidc_handle: return: 0
but I still can't figure why.At that stage, any hint would be welcome to finalize the setup.
Other probably unrelated and non-blocking problems encountered on the way but worth mentioning though:
_oauth2_openidc_cookie_valid: state cookie could not be retrieved/decoded
, but I'd like to go without state cookie for now. Sadly,oauth2_cfg_openidc_state_cookie_name_prefix_get()
makes impossible to set it NULL and avoid this warning.no crypto passphrase configured, generating one
, but no configuration allows for it (also note that this shows up in the log even afteroauth2_openidc_handle
failed)Beta Was this translation helpful? Give feedback.
All reactions