Closed jnweiger closed 3 years ago
openid-connect => array(),
leads to "Error, the provider URL has not been set"openid-connect
key in config: Alternative Login buttons (e.g. Kopano) are not shown.mysql -h db --user=owncloud --password=owncloud owncloud
select * from oc_appconfig where appid='openidconnect'
no configkey 'openid-connect'insert into oc_appconfig set appid='openidconnect', configkey='openid-connect', configvalue='{}'
update oc_appconfig set configvalue='{ "foo: 42 }' where configkey='openid-connect';
update oc_appconfig set configvalue='{ "provider-url": "https://konnect-oidc-210rc2-20211031.jw-qa.owncloud.works", "client-id": "ownCloud", "client-secret": "ownCloud", "loginButtonName": "Kopano", "autoRedirectOnLoginPage": false, "redirect-url": "https://oc1080-oidc-210rc2-20211031.jw-qa.owncloud.works/index.php/apps/openidconnect/redirect", "mode": "userid", "search-attribute": "preferred_username" }' where configkey='openid-connect';
@jnweiger no objections from my side. Regular uses cases working fine, and known restrictions are still there, but no blockers.
Setup
Test instances:
Setup details (click to view)
Automated setup script: https://github.com/owncloud-docker/compose-playground/blob/master/examples/hetzner-deploy/make_openidconnect_test.sh References: * https://github.com/owncloud/docs/issues/2855#issuecomment-719944884 * https://doc.owncloud.com/server/admin_manual/configuration/user/oidc/ * https://github.com/owncloud/openidconnect/issues/66#issuecomment-679093440 * https://github.com/owncloud/openidconnect/issues/66#issuecomment-708217650 * https://github.com/owncloud/openidconnect/issues/66#issuecomment-709999406 * https://github.com/owncloud/QA/blob/master/Mobile/GenericTPs/OIDC.md * https://github.com/owncloud/QA/blob/master/Server/Test_Plan_OAuth2.md * https://github.com/owncloud/QA/blob/master/Server/Test_Plan_Pluggable_Auth.mdTestplan
occ app:enable openidconnect
occ upgrade
is needed. #1352. Enter correct credentials
2. In iDP, cancel login process
2. Logout in the idP
openid-configuration
requestregister
endpoint availableregister
endpoint is requestedlogon
endpoint is requested after entering credentialsThe
authorize
endpoint is requested after authorizing/signin/v1/identifier
/signin/v1/consent
http://localhost:44155/
logon
endpoint is requested after entering credentialsThe
authorize
endpoint is requested after authorizing using client id and secret id granted by register endpointtoken
endoint is requested with refresh token to get a new token. This must be transparent for the client01-22 09:21:03:624 [ info sync.credentials.http ]: Refreshing token
01-22 09:21:03:759 [ info sync.httplogger ]: ... Request: POST ... /konnect/v1/token) -> https://github.com/owncloud/openidconnect/issues/182
2. Enable maintenance mode and upgrade to OIDC
3. add
'token_auth_enforced' => true
to config.php4. Disable maintenance mode;
2. Enable maintenance mode and upgrade to OIDC
3. Disable maintenance mode
2. Enable maintenance mode and upgrade to OIDC, keeping Oauth2 enabled
3. Disable maintenance mode
Android
Openidconnect: 2.1.0RC2 Device: Google Pixel 2 Android version: 11
2. Enter correct credentials
2. In iDP, cancel login process
2. Logout in the idP
openid-configuration
requestregister
endpoint availableregister
endpoint is requestedlogon
endpoint is requested after entering credentialsThe
authorize
endpoint is requested after authorizinglogon
endpoint is requested after entering credentialsThe
authorize
endpoint is requested after authorizing using client id and secret id granted by register endpointtoken
endoint is requested with refresh token to get a new token. This must be transparent for the client2. Enable maintenance mode and upgrade to OIDC
3. Disable maintenance mode
4. Force re-login
2. Enable maintenance mode and upgrade to OIDC
3. Disable maintenance mode
iOS
Openidconnect: 2.1.0RC2 Device: iPhoneXR iOS version: 15.0
2. Enter correct credentials
2. In iDP, cancel login process
2. Logout in the idP
openid-configuration
requestregister
endpoint availableregister
endpoint is requestedlogon
endpoint is requested after entering credentialsThe
authorize
endpoint is requested after authorizingauthorize
endpoint is requested after authorizing using client id and secret id granted by register endpointtoken
endpoint is requested with refresh token to get a new token. This must be transparent for the client2. Enable maintenance mode and upgrade to OIDC
3. Disable maintenance mode
4. Force re-login
2. Enable maintenance mode and upgrade to OIDC
3. Disable maintenance mode