-
This isn't so much an issue as a question--do you have a working example of how to use an external OpenID Connect provider for back office authentication? I tried modifying your 14+ example for back …
-
### Plugin(s)
- [ ] Analytics
- [ ] App
- [ ] App Check
- [X] Authentication
- [ ] Crashlytics
- [ ] Cloud Firestore
- [ ] Cloud Functions
- [ ] Cloud Messaging
- [ ] Cloud Storage
- [ ] P…
-
I try to implement Goth with generic OIDC providers like Authentik. The configurations for GitHub, AzureAD and Keycloak are working totally finbe, but with Authentik and the configuration below result…
-
Instead of enrolling with a pre-exchanged JWT or a certificate generated from a third-party CA, allow the configuration of external OIDC providers to prove an enrollee's identity and then allow the en…
-
Hi there, I have connected a Zitadel to Linkwarden – however that connector itself did not work (as the docs warn). I then chose the Keycloak connector which works fine but lacks the proper scope for …
-
**Is your feature request related to a problem? Please describe.**
When you configure a scope like this:
```
vault write identity/oidc/scope/profile \
description="Provides user info" \
t…
-
## Applies To
https://goteleport.com/docs/reference/terraform-provider/resources/oidc_connector/#nested-schema-for-spec
https://github.com/gravitational/teleport/blob/master/docs/pages/reference/t…
-
### Is there an existing issue for this?
- [X] I have searched the existing issues
### Describe the bug
When using the package Microsoft.AspNetCore.Authentication.OpenIdConnect in an ASP.NET Core a…
-
**Description**:
I want to authorize actions (with RBAC Filter) based on the claims from the IdToken (JWT) which is returned by the OAuth2 Filter.
Example UseCase: Authenticated user must be in a …
-
*This issue was originally created by [**@sandhose**](https://github.com/sandhose) at .*
We currently extract user claims through the ID token. In some cases, we would like to fetch instead the use…