Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

! Issues with version 1.6 of the plugin #62

Closed
mjmbischoff opened this issue Jan 23, 2019 · 8 comments
Closed

! Issues with version 1.6 of the plugin #62

mjmbischoff opened this issue Jan 23, 2019 · 8 comments
Milestone

Comments

@mjmbischoff
Copy link
Contributor

As indicated in #46 the spec seems to suggest that the scope shouldn't be send when performing an token request as such we won't be sending the scope anymore and thereby fixing the issue with some openid providers that break on this.

As the inverse could also be true: providers no longer working I've created this issue so people can report issues here.

As the only change between 1.5 and 1.6 is not sending the scope it is safe to downgrade to 1.5 and respond to this issue. We will make it configurable in future releases should this be the case.

@mjmbischoff mjmbischoff added this to the 1.6 milestone Jan 23, 2019
@mjmbischoff mjmbischoff pinned this issue Jan 23, 2019
@mjmbischoff mjmbischoff changed the title Issues with version 1.6 of the plugin ! Issues with version 1.6 of the plugin Jan 23, 2019
@uwehdaub
Copy link

uwehdaub commented Feb 13, 2019

We are using an inhouse developed OpenID connect compliant Auth server.
This is working fine with 1.5 but not with 1.6, because of the missing scope.
I would prefer to have this property configurable in future releases.

Just stumbled upon this part of the spec:
https://tools.ietf.org/html/rfc6749#section-3.3
Seems that the auth server has some freedom, to which the client has to adapt.

@mjmbischoff
Copy link
Contributor Author

mjmbischoff commented Feb 14, 2019

@uwehdaub Since the plugin is intended to make life easier for ops people and thus aim for max compatibility within reason - we'll add a configuration parameter in the next version.

@talmarco
Copy link

talmarco commented Apr 4, 2019

I've tried to integrate OpenID authentication with Jenkins and I'm getting the following error:
java.lang.Exception: no field 'preferred_username' was supplied in the token payload to be used as the username
Is this related to one of the changes in this version?

@caryyu
Copy link

caryyu commented Jul 2, 2019

When is version 1.7/1.6.1 going to be published?

@saikiranp80
Copy link

Hi,
How do I logout from jenkins without logging out from global logout ( global logout forces other pages which uses SSO also to be forced logout).

I enabled “Logout from OpenID Provider” and I am not sure what should be the value for "OpenID Provider logout endpoint URL."

is there a way only to logout properly ( by clearing all sessions & cookies) from jenkins when I use open id plugin so that when I click on login it doesn't login automatically from saved session details.

@SIkebe
Copy link

SIkebe commented Aug 13, 2019

I also encountered this issue and reverted it back to 1.5.

We will make it configurable in future releases should this be the case.

I hope it will be released :-)

@michael-doubez
Copy link
Contributor

I'll review the issues as soon as possible. Thanks for the inputs

@michael-doubez michael-doubez unpinned this issue Oct 15, 2022
@michael-doubez
Copy link
Contributor

Closing this long issue.

Reading the question, they should be fixed by newer versions.
If not, please, open a new issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

7 participants