-
Notifications
You must be signed in to change notification settings - Fork 231
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
UI: Authenticate with OAuth2 client ID / secret #1591
Comments
Interesting. Agree that would be great. |
Yes, I remember. |
Hi @thjaeckle, I'm coming back to this ticket. PKCE looks very promising but it needs some infrastructure (Authorization Server and OAuth2 Proxy for ditto?) and I think it will be easier to test if this is available in the cloud. I started with Google as an authorization server and tried out the Google authentication to the sandbox HTTP API.
|
Hi @thfries So the Ditto sandbox does not yet run OAuth2 proxy, but it should probably :D I will look into it once I find the time - that however could take a while :/ |
* make it configurable which OIDC issuers to use * re-did a lot of the existing configuration of the Ditto UI * added typing for Environment
* make it configurable which OIDC issuers to use * re-did a lot of the existing configuration of the Ditto UI * added typing for Environment
* make it configurable which OIDC issuers to use * re-did a lot of the existing configuration of the Ditto UI * added typing for Environment
…from local storage / oidc-library
…from local storage / oidc-library
…2 server in order to test SSO in Ditto UI
…2 server in order to test SSO in Ditto UI
…2 server in order to test SSO in Ditto UI
…2 server in order to test SSO in Ditto UI
…imsJws" instead of "parse"
…ds in "Auth" modal
…arerTokenFrom" to define from where to extract the Bearer token * also used "state" to propagate back to client after redirect if main or oauth SSO was done, or both
…arerTokenFrom" to define from where to extract the Bearer token * also used "state" to propagate back to client after redirect if main or oauth SSO was done, or both
…er to make search bookmarkable and survive SSO redirects * base64 encoded url_state
Currently the UI accepts a Bearer token for authenticating.
More comfortable however would be if the UI would authenticate against a configured OAuth provider endpoint, using a client ID and optional (not all OAuth flows require a secret) secret.
The Swagger UI also supports such a mode where the OAuth provider configuration is added.
As the Ditto UI saves the environments locally, the OAuth secret does not need to be persisted or configured statically which should suffice security wise.
The text was updated successfully, but these errors were encountered: