Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Having issues while trying to protect server with OIDC RP #32

Open
b-rajesh opened this issue Jul 8, 2021 · 1 comment
Open

Having issues while trying to protect server with OIDC RP #32

b-rajesh opened this issue Jul 8, 2021 · 1 comment
Labels
enhancement New feature or request

Comments

@b-rajesh
Copy link

b-rajesh commented Jul 8, 2021

Hi

When i am trying to protect the server (instead of location) with OIDC RP reference implementation , login flow is not kicking off. It works fine if we have the following defined in the location block works fine as mentioned in the reference implementation
error_page 401 = @do_oidc_flow;
auth_jwt "authz" token=$session_jwt;
auth_jwt_key_request /_jwks_uri; # Enable when using filename

Since the auth_jwt is defined in the server block , the named location is also being protected . I was directed to use
auth_jwt off;
in the openid_connect.server_conf

Can we fix the openid_connect.server_conf to have the same ? though the reference implementation doesn't have this challenge, it would helpful if anyone wanted to protect the whole server to with the given config.

@tippexs tippexs added the question Further information is requested label Jul 8, 2021
@tippexs
Copy link
Contributor

tippexs commented Nov 1, 2021

Hi @b-rajesh sorry for the late response. As discussed back in July I do not have any security concerns disabling the jwt protection for the locations handling the authentication.

Did you do any testing with the suggested solution?

@tippexs tippexs added enhancement New feature or request and removed question Further information is requested labels Nov 1, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants