-
-
Notifications
You must be signed in to change notification settings - Fork 3.1k
Improved OIDC authentication #7445
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Improved OIDC authentication #7445
Conversation
…configuration and added the option to merge claims from the id token
What if the oidc server doesn't have a .well-known endpoint? It should still allows to specify the endpoints manually. |
I actually wasn't fully aware that the discovery endpoint is optional for OIDC. |
That would work for me. |
@H3xaChad Fist of all, thank you for your PR and the work behind it. |
…ders not having a well-known endpoint
660a4a5
to
cb35303
Compare
@MaBauMeBad sorry for that long break - private stuff... :) |
Improve OIDC Authentication
Summary:
wellKnownURL
to auto-fetch OIDC endpoints.mergeIdTokenClaims
option to merge claims from the ID token with the user profile.Why:
One dependency was added (jwks-rsa) since it is mandatory to verify the ID token
Hope you find some time to look into the PR give some feedback! :)