Open ronny35 opened 2 years ago
did you ever figure this out? I'm having the same issue.
No, this issue still occurs
Bump. Same with me with the robrotheram/taiga-*-openid
images.
Have you set ENABLE_OPENID: "True"
?
@adrha Yes. I have ENABLE_OPENID: "True"
on the backend and ENABLE_OPENID: "true"
on the frontend.
I get redirected to my SSO solution, my credentials are validated, but upon returning to Taiga I get "invalid login type" error.
@dcabecinhas okay, I experienced the same issue with the login-type error, when I forgot to enable the OIDC.
Since then, I'm getting an error that the OIDC information could not be read from the token (after a very long timeout when Keycloak redirected me after login). This issue is also an open issue from someone else here in the project.
This project doesn't work at all for me either, and provides almost zero context as to why.
Do you have any updates on this? I'm facing the same issue.
Hi,
I am using Docker image with OpenID auth preinstallation but, after configuration (Keycloak urls), I have this error : invalid login type, even if login process is successful in Keycloak.
Could you help me on this topic ?
conf.json is : { "api": "https://taiga/api/v1/", "eventsUrl": "ws://localhost:9000/events", "eventsMaxMissedHeartbeats": 5, "eventsHeartbeatIntervalTime": 60000, "eventsReconnectTryInterval": 10000, "debug": false, "debugInfo": false, "defaultLanguage": "en", "themes": ["taiga"], "defaultTheme": "taiga", "defaultLoginEnabled": true, "publicRegisterEnabled": true, "feedbackEnabled": true, "supportUrl": "https://resources.taiga.io", "privacyPolicyUrl": null, "termsOfServiceUrl": null, "maxUploadFileSize": null, "contribPlugins": ["/plugins/openid-auth/openid-auth.json"], "gitHubClientId": "", "gitLabClientId": "", "gitLabUrl": "", "tagManager": { "accountId": null }, "tribeHost": null, "enableAsanaImporter": false, "enableGithubImporter": false, "enableJiraImporter": false, "enableTrelloImporter": false, "gravatar": false, "rtlLanguages": ["fa"], "openidAuth" : "https://XXXauth/realms/YYY/protocol/openid-connect/auth", "openidScope" : "openid email", "openidName" : "keycloak", "openidClientId": "ZZZ" }