0
0
Fork 1
mirror of https://mau.dev/maunium/synapse.git synced 2024-12-30 08:03:59 +01:00
Commit graph

21 commits

Author SHA1 Message Date
Hugo DELVAL
86415f162d
doc: add django-oauth-toolkit to oidc doc ()
Signed-off-by: Hugo Delval <hugo.delval@gmail.com>
2021-08-23 17:12:36 +00:00
Andrew Morgan
3e83f97154
Fix the titles in the OIDC documentation ()
* Fix the titles in the OIDC documentation

Having them as links broke the table-of-contents rendering in mdbook.
Plus there's no reason for only some of the provider titles to be links.

* Changelog

* Add link to google idp docs
2021-08-23 14:58:31 +01:00
Patrick Cloke
5b68816de9
Fix the hierarchy of OpenID providers in the docs. () 2021-07-21 13:48:06 -04:00
Richard van der Hoff
dd69110d95
Add support for stable MSC2858 API ()
The stable format uses different brand identifiers, so we need to support two
identifiers for each IdP.
2021-03-16 11:21:26 +00:00
Richard van der Hoff
eaada74075
JWT OIDC secrets for Sign in with Apple ()
Apple had to be special. They want a client secret which is generated from an EC key.

Fixes . Also fixes  while I'm here.
2021-03-09 15:03:37 +00:00
Marcus
5636e597c3
Fix OIDC gitiea redirect URL. ()
Fixes a "conflict" from 846b9d3df0
and d1f13c7485.
2021-02-16 14:06:55 -05:00
Thomas Mortagne
5f716fa777
Add XWiki OIDC provider example. () 2021-02-09 11:54:52 -05:00
Richard van der Hoff
846b9d3df0
Put OIDC callback URI under /_synapse/client. () 2021-02-01 22:56:01 +00:00
Oliver Hanikel
d1f13c7485
Add an OpenID example config for Gitea. () 2021-02-01 16:21:09 -05:00
Richard van der Hoff
0d81a6fa3e Merge branch 'social_login' into develop 2021-01-28 22:08:11 +00:00
Richard van der Hoff
34efb4c604
Add notes on integrating with Facebook for SSO login. () 2021-01-27 22:57:16 +00:00
Richard van der Hoff
a083aea396
Add 'brand' field to MSC2858 response ()
We've decided to add a 'brand' field to help clients decide how to style the
buttons.

Also, fix up the allowed characters for idp_id, while I'm in the area.
2021-01-27 21:31:45 +00:00
Richard van der Hoff
9de6b94117
Land support for multiple OIDC providers ()
This is the final step for supporting multiple OIDC providers concurrently.

First of all, we reorganise the config so that you can specify a list of OIDC providers, instead of a single one. Before:

    oidc_config:
       enabled: true
       issuer: "https://oidc_provider"
       # etc

After:

    oidc_providers:
     - idp_id: prov1
       issuer: "https://oidc_provider"

     - idp_id: prov2
       issuer: "https://another_oidc_provider"

The old format is still grandfathered in.

With that done, it's then simply a matter of having OidcHandler instantiate a new OidcProvider for each configured provider.
2021-01-15 16:55:29 +00:00
Christopher Rücker
bce0c91d9a
Keycloak mapping_provider example () ()
This PR adds the missing user_mapping_provider section in oidc.md

Signed-off-by: Christopher Rücker chris-ruecker@protonmail.com
2021-01-08 18:29:30 +00:00
Matthew Hodgson
11fd90a2b7 typo 2020-11-02 13:33:56 +00:00
Peter Krantz
6c9ab61df5
Added basic instructions for Azure AD to OpenId documentation ()
Signed-off-by: Peter Krantz peter.krantz@gmail.com
2020-10-26 17:49:55 +00:00
Andrew Morgan
f6a3859a73
Fix filepath of Dex example config () 2020-10-26 16:53:11 +00:00
Andrew Morgan
4fb7a68a65 Correct the package name in authlib install instructions 2020-10-22 18:25:58 +01:00
BBBSnowball
05ee048f2c
Add config option for always using "userinfo endpoint" for OIDC ()
This allows for connecting to certain IdPs, e.g. GitLab.
2020-10-01 13:54:35 -04:00
hungrymonkey
5c5516f80e
Add instructions for authing with Keycloak via OpenID () 2020-06-16 11:28:21 -04:00
Richard van der Hoff
11de843626
Cleanups to the OpenID Connect integration ()
docs, default configs, comments. Nothing very significant.
2020-06-03 21:13:17 +01:00