-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use mod_auth_openidc 2.2+ with session info and access type public #17
Conversation
…nid, all defaults
Public vs. confidential is clearly described in https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.0/html/server_administration_guide/sso_protocols:
There's no reason to change the default, as Keycloak requires the field "Valid Redirect URIs" to be set. Field description:
I found this article that explains OpenID Connect. |
an initial import is required, something like https://github.com/keycloak/keycloak-nodejs-auth-utils/blob/v3.1.0/scripts/start-server.sh#L38
I'd actually prefer that but we have downstream builds that depend on the structure from https://hub.docker.com/_/httpd/ and I thought (guessed actually) that the binaries wouldn't install there. I can give it a try. |
@zandbelt It's been very useful to be able to test with mod_auth_openidc directly from a github commit, so would it be possible to publish libcjose0 |
I see; well my release builds will always produce libjose* and libjose*-dev packages here: https://mod-auth-openidc.org/download [edit]: |
That's safe: assuming you're using binaries for the target platform (jessie in this case) and you haven't modified the stock apache binaries on there, these packages are built using |
Before the support for https://github.com/pingidentity/mod_auth_openidc/wiki/Single-Page-Applications we've used a special
Location
that sort of supports session info:And to refresh we were using jQuery this way:
Also we've always used Access Type "confidential" for the openid-connect client in Keycloak, but that seems to block token based auth.