mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-25 09:25:55 +03:00
[PR #2630] FEAT: Open ID Cconnect authentication #3595
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#3595
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/NginxProxyManager/nginx-proxy-manager/pull/2630
Author: @marekful
Created: 2/24/2023
Status: 🔄 Open
Base:
master← Head:FEAT/open-id-connect-authentication📝 Commits (10+)
caeb293FEAT: Add Open ID Connect authentication method3e2a411chore: add oidc setting db entry during setup457d1a7chore: improve oidc setting ui8350271chore: add message textsbc0b466refactor: improve code structurebaee464chore: improve error handling6f98fa6refactor: satisfy linter requirementsdf5ab36chore: update comments, remove debug loggingef64eddfix: add database migration for oidc-config settingfd49644fix: linter📊 Changes
19 files changed (+510 additions, -13 deletions)
View changed files
📝
backend/internal/token.js(+41 -0)📝
backend/lib/express/jwt-decode.js(+3 -1)📝
backend/logger.js(+2 -1)📝
backend/package.json(+1 -0)📝
backend/routes/api/main.js(+1 -0)➕
backend/routes/api/oidc.js(+168 -0)📝
backend/routes/api/settings.js(+11 -0)📝
backend/routes/api/tokens.js(+2 -0)📝
backend/setup.js(+27 -3)📝
backend/yarn.lock(+37 -0)📝
frontend/js/app/api.js(+2 -0)📝
frontend/js/app/controller.js(+5 -0)📝
frontend/js/app/settings/list/item.ejs(+8 -0)➕
frontend/js/app/settings/oidc-config/main.ejs(+56 -0)➕
frontend/js/app/settings/oidc-config/main.js(+46 -0)📝
frontend/js/i18n/messages.json(+5 -1)📝
frontend/js/login/ui/login.ejs(+8 -1)📝
frontend/js/login/ui/login.js(+57 -6)📝
frontend/scss/custom.scss(+30 -0)📄 Description
FEAT: Add Open ID Connect authentication method (SSO)
Resolves: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/2562 https://github.com/NginxProxyManager/nginx-proxy-manager/issues/69 https://github.com/NginxProxyManager/nginx-proxy-manager/issues/437 https://github.com/NginxProxyManager/nginx-proxy-manager/issues/1624
oidc-configsetting allowing an admin user to configure parametersopenid-clientv5.4.0initialisation
user with email matching the one retrieved from oauth claims exists
Note: Only Open ID Connect Discovery is supported which most modern
Identity Providers offer.
Tested with Authentik 2023.2.2 and Keycloak 18.0.2
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.