Skip to content

Conversation

@route443
Copy link
Contributor

Updates openid_connect.server_conf to enforce secure TLS settings on all IdP-bound requests (/_token, /_refresh, /_jwks_uri). This adds:

  • proxy_ssl_verify on to enforce verification of the OP’s TLS certificate.
  • proxy_ssl_trusted_certificate /etc/ssl/certs/ca-certificates.crt to use the system (Debian/Ubuntu/Alpine) CA bundle for trust.
  • proxy_ssl_verify_depth 2 to allow certificate chains up to one intermediate CA.

Address issue #116

Updates `openid_connect.server_conf` to enforce secure TLS settings on all IdP-bound requests (`/_token`, `/_refresh`, `/_jwks_uri`). This adds:
- `proxy_ssl_verify on` to enforce verification of the OP’s TLS certificate.
- `proxy_ssl_trusted_certificate /etc/ssl/certs/ca-certificates.crt` to use the system (Debian/Ubuntu/Alpine) CA bundle for trust.
- `proxy_ssl_verify_depth 2` to allow certificate chains up to one intermediate CA.
@route443 route443 merged commit c866e23 into main Nov 13, 2025
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants