-
Notifications
You must be signed in to change notification settings - Fork 183
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[5.0.7] Embedded IdP client registration doesn't allow redirect URI #10159
Comments
Could you point some official docs where that is a thing? So far, I've only seen docs for custom protocols such as |
Thats the point. |
I guess it isn't supported, at least for now. You can try to open a ticket in https://github.com/libregraph/lico/ in order for them to allow those URIs. Then, us updating the server version should fix the issue. |
I am closing this one. As this is tracked upstream now. |
Describe the bug
When creating a custom client registration using redirect_uri of format "protocol:action", the embedded IdP refuses to cooperate.
Steps to reproduce
Create
config/idp.yaml
, withExpected behavior
When logging in with an OAuth client using above values, this should work just fine with the openid-configuration endpoints:
When you call the configuration option "redirect_uri" this should accept all URI-types, not just URLs, otherwise rename to redirect_urls, or state, with a warning, that this must be an URL, not a URI.
Actual behavior
Despite a client registration, that looks to be valid (based on the desktop client configuration) the authentication is still not possible.
Responds with
Setup
docker-compose setup, behind reverse proxy - works fine for the desktop client and web interface, but not for custom clients, with embedded IdM and IdP.
Additional context
Changing the redirect uri to a url
protocol://action
works fine - but the semantic for URLs is a different one from URIs, where URLs are URIs of formatprotocol://[identity@]authority[:port]/path[?query][#anchor]
, where authority isoauth
is different from using a URI, where the protocol content is arbitrary and application defined (i.e.x-app-action:oauth
is semantically different fromx-app-action://oauth
).The text was updated successfully, but these errors were encountered: