Skip to content

Conversation

@cardoe
Copy link
Contributor

@cardoe cardoe commented Dec 10, 2025

The device authorization and the client credentials flows are OAuth 2.0 flows instead of OIDC so we need to be able to validate the token submitted against the endpoint so we need to also read the metadata for the OAuth 2.0 paths of mod_auth_openidc. Add another authentication endpoint into apache for Keystone so that we can route the authentication request to the correct connector inside of Dex to successfully complete the authentication.

The device authorization and the client credentials flows are OAuth 2.0
flows instead of OIDC so we need to be able to validate the token
submitted against the endpoint so we need to also read the metadata for
the OAuth 2.0 paths of mod_auth_openidc. Add another authentication
endpoint into apache for Keystone so that we can route the
authentication request to the correct connector inside of Dex to
successfully complete the authentication.
@cardoe cardoe requested a review from a team December 10, 2025 19:33
Add additional env vars to be loaded to make the naming clearer that
these are for connectors and not for regular client authentication.
<Location /v3/OS-FEDERATION/identity_providers/sso/protocols/mapped/auth>
Require valid-user
AuthType oauth20
# TODO: variablize this better
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

looks like the helm templating is supported here, so maybe just make it a configurable value with a sensible default?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants