Missing /.well-known/openid-configuration endpoint
See original GitHub issueWhen attempting to use Frappe as an IdP, there seems to be no access to /.well-known/openid-configuration
or similar. This endpoint provides dynamic configuration for dependent systems to properly build requests and responses to their dependent IdP in a format that the IdP understands.
Why this is important is to avoid additional deployments of dependent systems, as the dependent systems can adjust using the configuration from the IdP.
Has there been any research and/or a proposal to attempt to implement such a document?
Issue Analytics
- State:
- Created 3 years ago
- Comments:10
Top Results From Across the Web
8 - Stack Overflow
Failed to load http://localhost:5000/.well-known/openid-configuration: No 'Access-Control-Allow-Origin' header is present on the requested ...
Read more >Get OpenID Connect Well-Known Configuration
Returns the OpenID Connect configuration values from the provider's Well-Known Configuration Endpoint, per the specification (http://openid.net/specs/openid- ...
Read more >Help - Auth0 Community
I recently came across this OpenID well-known configuration does not contain logout endpoint. We have an application where any open-id ...
Read more >openId Connect EndPoints Missing on ADFS
Hi,. Can any one tell the cause, why i am not able to see OpenID Endpoint on my ADFS 2016 Server. Thanks in...
Read more >OpenID Discovery document does not have CORS headers
The following endpoints should have CORS headers to enable browser based user-agents to work with Gitlab. /.well-known/openid-configuration ...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
/api/method/dot.path.to.function
), as a workaround we either need to reverse proxy it on nginx and have some endpoint, or add code to frappe to allow such endpoint. or just add/api/method/frappe.integrations.oauth2.openid_configuration
b''
and it’s not tested in test_oauth20.py so nothing got noticed.Do send PR and tag me if you change anything.
For more compliant OAuth2+OIDC use one of the following.
Configure one of these as
Social Login Key
and the integration will be seamless. If you need tokens from Frappe OAuth 2.0 provider for making user requests, they will also be issued even after logging in with social login key.OK. My opinion here is that the OAuth endpoints are pretty much broken. There seems to be too many elements missing or their implementation is counter-productive to its usage:
I have not gotten further, but I need to put further work on this on-hold until I can get further along.