-
### Is your feature request related to a problem? Please describe
Currently there is no way to force a user to be re-authenticated from an oidc client, see also #2988.
### Describe the solution …
-
When setting `import = true` on an openid client, values defined in the terraform config for other fields are not applied on create, and appear as changes in a subsequent apply.
For example:
```…
-
### Problem Description
Currently, Coder supports a single OIDC provider for authentication, which limits flexibility in environments where multiple user groups from different organizations need acces…
-
More error checking can be done when accessing nlohmann json objects and try/catch blocks or `...contains(...)` calls when using jwt-cpp.
-
### Description
For OIDC to OIDC Client token exchange, Keycloak ask for user consent based on target client.
However, token exchange is not a browser flow. So, user can not give any extra consent a…
-
Is there any support for public oidc client / implicit flow so I do not need to pass the --oidc-client-secret , but only the --oidc-client-id?
-
**Describe the bug**
When upgraded to latest version `0.22.2` of this library getting the following error:
```
Error [ERR_REQUIRE_ESM]: require() of ES Module /home/app/node_modules/openid-client/b…
-
### Issue and Steps to Reproduce
I'm trying to get a simple example up and running. It's built on Vue.js but I think that doesn't matter here. My aim is to login (successful) and run a fetch on an …
-
### 🔖 Feature description
Add OIDC auth provider implementation that works completely in the browser in addition to current implementation where the actual OIDC flow (getting an access token from an …
-
### Describe the bug
Hello,
When trying to deploy langfuse on a Kubernetes cluster with the following environment variables (related to auth):
LANGFUSE_INIT_USER_EMAIL=John.Doe@mycompan…