Open
Conversation
- Added OIDC log in (and user provisioning) - Added config env vars for OIDC - Added log out page - Updated dependencies
Contributor
|
Does this assign the admin role based on OIDC group membership? |
Author
In the current version no. Only the first user receives the admin role and can then assign this role to other users. But I'm willing to work on this feature if you wish. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR adds the support for OAuth2/OIDC log in (and user provisioning). The implementation uses the built-in user system, and only do log in/register with OIDC (it doesn't use the session management mechanisms of OIDC).
This fork was not intended to be merged with upstream, but after seeing that SSO was a requested feature (issue #233), I decided to open this pull request (hoping that it can be useful!).
Work done:
RM_OIDC_ISSUER,RM_OIDC_CLIENT_ID,RM_OIDC_CLIENT_SECRET) plus some customisation (RM_OIDC_LABELto change the log in button label,RM_OIDC_ONLYto disable password auth)ui/api/oidc/infoto query OIDC availability and button label,ui/api/oidc/authto launch OIDC auth,ui/api/oidc/callbackto finish OIDC auth)OPEN_REGISTRATIONistrue). The new users use a randomly generated password (which is not used when OIDC is enabled).A working Docker image is hosted on DockerHub (deleranax/rmfakecloud).