-
Notifications
You must be signed in to change notification settings - Fork 231
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Configuring "oauth2" based authentication for "devops" access does not allow to use a different OpenID connect provider #1946
Comments
thjaeckle
added a commit
to beyonnex-io/ditto
that referenced
this issue
May 29, 2024
…thorization could not be configured * improved logging correlationId also for devops auth in gateway as well Signed-off-by: Thomas Jäckle <[email protected]>
thjaeckle
added a commit
to beyonnex-io/ditto
that referenced
this issue
May 29, 2024
…thorization could not be configured * improved logging correlationId also for devops auth in gateway as well Signed-off-by: Thomas Jäckle <[email protected]>
thjaeckle
added a commit
to beyonnex-io/ditto
that referenced
this issue
May 29, 2024
…rectly with environment variable Signed-off-by: Thomas Jäckle <[email protected]>
thjaeckle
added a commit
to beyonnex-io/ditto
that referenced
this issue
May 29, 2024
…rectly with environment variable Signed-off-by: Thomas Jäckle <[email protected]>
thjaeckle
added a commit
to beyonnex-io/ditto
that referenced
this issue
May 29, 2024
…rectly with environment variable Signed-off-by: Thomas Jäckle <[email protected]>
thjaeckle
added a commit
to beyonnex-io/ditto
that referenced
this issue
May 29, 2024
…rectly with environment variable Signed-off-by: Thomas Jäckle <[email protected]>
thjaeckle
added a commit
to beyonnex-io/ditto
that referenced
this issue
May 30, 2024
…rectly with environment variable Signed-off-by: Thomas Jäckle <[email protected]>
thjaeckle
added a commit
to beyonnex-io/ditto
that referenced
this issue
May 31, 2024
…rectly with environment variable Signed-off-by: Thomas Jäckle <[email protected]>
thjaeckle
added a commit
to beyonnex-io/ditto
that referenced
this issue
May 31, 2024
…rectly with environment variable Signed-off-by: Thomas Jäckle <[email protected]>
thjaeckle
added a commit
to beyonnex-io/ditto
that referenced
this issue
May 31, 2024
…rectly with environment variable Signed-off-by: Thomas Jäckle <[email protected]>
thjaeckle
added a commit
that referenced
this issue
Jun 10, 2024
…ects-config #1946 fix that alternative OIDC provider for "devops" authorization could not be configured
thjaeckle
added a commit
that referenced
this issue
Jun 10, 2024
…ould not be configured * improved logging correlationId also for devops auth in gateway as well Signed-off-by: Thomas Jäckle <[email protected]>
thjaeckle
added a commit
that referenced
this issue
Jun 10, 2024
…nvironment variable Signed-off-by: Thomas Jäckle <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
When configuring to secure access to DevOps commands and to connections using
oauth2
via Helm:ditto/deployment/helm/ditto/values.yaml
Lines 1533 to 1546 in 5239859
It is currently not possible to choose in the
openidConnectIssuers
a different OpenID connect provider than already defined in the "normal" oauth2 configuration at:ditto/deployment/helm/ditto/values.yaml
Lines 1515 to 1525 in 5239859
E.g. with a
-ops
suffix as in the comments .. Or even a completely different "issuer" endpoint.The reason seems to be that this is loaded as "Extension" in Ditto (so basically a Singleton) and that only the first configuration is applied (which is the "normal" oauth2 config).
So e.g. having admin users in a separated OpenID connect provider is not possible.
I also figured that this is currently not at all documented at DevOps commands - so adding some documentation about the option to use oauth for securing admin access would also be good as part of the bugfix.
The text was updated successfully, but these errors were encountered: