-
## Description
Some peer dependencies are incorrectly met by dependencies; run yarn explain peer-requirements for details.
## Environment
Manual setup on Ubuntu 2204, not using any docker
1. O…
-
Hi there,
Currently the supported authentication types are pat, basic, azure-client-secret, azure-msi, azure-cli, google-credentials, and google-id for databricks provider.
Proposal
With the in…
-
# Reproducing
- Start the docker compose in `backend/docker-services/keycloak` with `docker compose up`.
- Add this setting (to for example `base.py`) `OIDC_RENEW_ID_TOKEN_EXPIRY_SECONDS` = 0.
- …
-
https://jira.suse.com/browse/SURE-9134
**Rancher Server Setup**
- Rancher version: SUSE Rancher 2.8.9, SUSE Rancher 2.9.2
Issue description:
When setting up the Keycloak Authentication provi…
-
I use Authentik as my OIDC provider, and I set the redirect_uri format in Authentik to "https://your-huly-instance.com/auth/callback" for callback when authentication is verified in Authentik. However…
-
**Is your feature request related to a problem? Please describe.**
Support for Open ID Connect (OIDC) was recently added to the JFrog Platform.
Currently the documentation only shows official supp…
-
### Environment
Docker
### Version
0.15.3
### Describe the problem
Set up OIDC from Keycloak. Will log in, but although setting owner and admin groups both in Keycloak and through envir…
-
We have some issues when adding OIDC Providers. It looks like some fields are needed otherwise there is just a `server error` and a trace id. Which are these and why?
-
Hello,
I am using the `nuxt-oidc-auth` module in my Nuxt application and I’m wondering if it’s possible to redirect users back to the originally blocked URL after logging in via a provider (e.g., K…
-
Our current Terraform asks for the URL of an OIDC provider that is already associated with the cluster. Our most common use-case is to associate the OIDC provider AWS creates along with the cluster an…