2021-05-05 05:06:05 +07:00
|
|
|
---
|
|
|
|
layout: default
|
|
|
|
title: OpenID Connect
|
|
|
|
parent: Identity Providers
|
|
|
|
grand_parent: Configuration
|
|
|
|
nav_order: 2
|
|
|
|
---
|
|
|
|
|
|
|
|
# OpenID Connect
|
|
|
|
|
|
|
|
**Authelia** currently supports the [OpenID Connect] OP role as a [beta](#beta) feature. The OP role is the
|
|
|
|
[OpenID Connect] Provider role, not the Relaying Party or RP role. This means other applications that implement the
|
|
|
|
[OpenID Connect] RP role can use Authelia as an authentication and authorization backend similar to how you may use
|
|
|
|
social media or development platforms for login.
|
|
|
|
|
|
|
|
The Relaying Party role is the role which allows an application to use GitHub, Google, or other [OpenID Connect]
|
|
|
|
providers for authentication and authorization. We do not intend to support this functionality at this moment in time.
|
|
|
|
|
|
|
|
## Beta
|
|
|
|
|
|
|
|
We have decided to implement [OpenID Connect] as a beta feature, it's suggested you only utilize it for testing and
|
|
|
|
providing feedback, and should take caution in relying on it in production. [OpenID Connect] and it's related endpoints
|
|
|
|
are not enabled by default unless you specifically configure the [OpenID Connect] section.
|
|
|
|
|
|
|
|
The beta will be broken up into stages. Each stage will bring additional features. The following table is a *rough* plan
|
|
|
|
for which stage will have each feature, and may evolve over time:
|
|
|
|
|
|
|
|
<table>
|
|
|
|
<thead>
|
|
|
|
<tr>
|
|
|
|
<th class="tbl-header">Stage</th>
|
|
|
|
<th class="tbl-header">Feature Description</th>
|
|
|
|
</tr>
|
|
|
|
</thead>
|
|
|
|
<tbody>
|
|
|
|
<tr>
|
|
|
|
<td rowspan="7" class="tbl-header tbl-beta-stage">beta1</td>
|
|
|
|
<td><a href="https://openid.net/specs/openid-connect-core-1_0.html#Consent" target="_blank" rel="noopener noreferrer">User Consent</a></td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td><a href="https://openid.net/specs/openid-connect-core-1_0.html#CodeFlowSteps" target="_blank" rel="noopener noreferrer">Authorization Code Flow</a></td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td><a href="https://openid.net/specs/openid-connect-discovery-1_0.html" target="_blank" rel="noopener noreferrer">OpenID Connect Discovery</a></td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td>RS256 Signature Strategy</td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td>Per Client Scope/Grant Type/Response Type Restriction</td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td>Per Client Authorization Policy (1FA/2FA)</td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td class="tbl-beta-stage">Per Client List of Valid Redirection URI's</td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
2021-07-10 11:56:33 +07:00
|
|
|
<td rowspan="1" class="tbl-header tbl-beta-stage">beta2 <sup>1</sup></td>
|
|
|
|
<td class="tbl-beta-stage"><a href="https://openid.net/specs/openid-connect-core-1_0.html#UserInfo" target="_blank" rel="noopener noreferrer">Userinfo Endpoint</a> (missed in beta1)</td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td rowspan="2" class="tbl-header tbl-beta-stage">beta3 <sup>1</sup></td>
|
2021-05-05 05:06:05 +07:00
|
|
|
<td>Token Storage</td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td class="tbl-beta-stage">Audit Storage</td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
2021-07-10 11:56:33 +07:00
|
|
|
<td rowspan="4" class="tbl-header tbl-beta-stage">beta4 <sup>1</sup></td>
|
2021-05-05 05:06:05 +07:00
|
|
|
<td><a href="https://openid.net/specs/openid-connect-backchannel-1_0.html" target="_blank" rel="noopener noreferrer">Back-Channel Logout</a></td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td>Deny Refresh on Session Expiration</td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td><a href="https://openid.net/specs/openid-connect-messages-1_0-20.html#rotate.sig.keys" target="_blank" rel="noopener noreferrer">Signing Key Rotation Policy</a></td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td class="tbl-beta-stage">Client Secrets Hashed in Configuration</td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td class="tbl-header tbl-beta-stage">GA <sup>1</sup></td>
|
|
|
|
<td class="tbl-beta-stage">General Availability after previous stages are vetted for bug fixes</td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td rowspan="2" class="tbl-header">misc</td>
|
|
|
|
<td>List of other features that may be implemented</td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td class="tbl-beta-stage"><a href="https://openid.net/specs/openid-connect-frontchannel-1_0.html" target="_blank" rel="noopener noreferrer">Front-Channel Logout</a> <sup>2</sup></td>
|
|
|
|
</tr>
|
|
|
|
</tbody>
|
|
|
|
</table>
|
|
|
|
|
|
|
|
*<sup>1</sup> this stage has not been implemented as of yet*
|
|
|
|
|
|
|
|
*<sup>2</sup> this individual feature has not been implemented as of yet*
|
|
|
|
|
|
|
|
## Configuration
|
|
|
|
|
|
|
|
```yaml
|
|
|
|
identity_providers:
|
|
|
|
oidc:
|
|
|
|
hmac_secret: this_is_a_secret_abc123abc123abc
|
|
|
|
issuer_private_key: |
|
|
|
|
--- KEY START
|
|
|
|
--- KEY END
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
access_token_lifespan: 1h
|
|
|
|
authorize_code_lifespan: 1m
|
|
|
|
id_token_lifespan: 1h
|
|
|
|
refresh_token_lifespan: 720h
|
|
|
|
enable_client_debug_messages: false
|
2021-05-05 05:06:05 +07:00
|
|
|
clients:
|
|
|
|
- id: myapp
|
|
|
|
description: My Application
|
|
|
|
secret: this_is_a_secret
|
|
|
|
authorization_policy: two_factor
|
|
|
|
redirect_uris:
|
|
|
|
- https://oidc.example.com:8080/oauth2/callback
|
|
|
|
scopes:
|
|
|
|
- openid
|
|
|
|
- groups
|
|
|
|
- email
|
|
|
|
- profile
|
|
|
|
grant_types:
|
|
|
|
- refresh_token
|
|
|
|
- authorization_code
|
|
|
|
response_types:
|
|
|
|
- code
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
response_modes:
|
|
|
|
- form_post
|
|
|
|
- query
|
|
|
|
- fragment
|
2021-07-10 11:56:33 +07:00
|
|
|
userinfo_signing_algorithm: none
|
2021-05-05 05:06:05 +07:00
|
|
|
```
|
|
|
|
|
|
|
|
## Options
|
|
|
|
|
|
|
|
### hmac_secret
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
<div markdown="1">
|
|
|
|
type: string
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
required: yes
|
|
|
|
{: .label .label-config .label-red }
|
|
|
|
</div>
|
2021-05-05 05:06:05 +07:00
|
|
|
|
|
|
|
The HMAC secret used to sign the [OpenID Connect] JWT's. The provided string is hashed to a SHA256 byte string for
|
|
|
|
the purpose of meeting the required format.
|
|
|
|
|
|
|
|
Can also be defined using a [secret](../secrets.md) which is the recommended for containerized deployments.
|
|
|
|
|
|
|
|
### issuer_private_key
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
<div markdown="1">
|
|
|
|
type: string
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
required: yes
|
|
|
|
{: .label .label-config .label-red }
|
|
|
|
</div>
|
|
|
|
|
|
|
|
The private key in DER base64 encoded PEM format used to encrypt the [OpenID Connect] JWT's. This can easily be
|
|
|
|
generated using the Authelia binary using the following syntax:
|
|
|
|
|
|
|
|
```console
|
|
|
|
authelia rsa generate --dir /config
|
|
|
|
```
|
2021-05-05 05:06:05 +07:00
|
|
|
|
|
|
|
Can also be defined using a [secret](../secrets.md) which is the recommended for containerized deployments.
|
|
|
|
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
### access_token_lifespan
|
|
|
|
<div markdown="1">
|
|
|
|
type: duration
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
default: 1h
|
|
|
|
{: .label .label-config .label-blue }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
|
|
|
|
|
|
|
The maximum lifetime of an access token. It's generally recommended keeping this short similar to the default.
|
|
|
|
For more information read these docs about [token lifespan].
|
|
|
|
|
|
|
|
### authorize_code_lifespan
|
|
|
|
<div markdown="1">
|
|
|
|
type: duration
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
default: 1m
|
|
|
|
{: .label .label-config .label-blue }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
|
|
|
|
|
|
|
The maximum lifetime of an authorize code. This can be rather short, as the authorize code should only be needed to
|
|
|
|
obtain the other token types. For more information read these docs about [token lifespan].
|
|
|
|
|
|
|
|
### id_token_lifespan
|
|
|
|
<div markdown="1">
|
|
|
|
type: duration
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
default: 1h
|
|
|
|
{: .label .label-config .label-blue }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
|
|
|
|
|
|
|
The maximum lifetime of an ID token. For more information read these docs about [token lifespan].
|
|
|
|
|
|
|
|
### refresh_token_lifespan
|
|
|
|
<div markdown="1">
|
|
|
|
type: string
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
default: 30d
|
|
|
|
{: .label .label-config .label-blue }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
|
|
|
|
|
|
|
The maximum lifetime of a refresh token. This should typically be slightly more the other token lifespans. This is
|
|
|
|
because the refresh token can be used to obtain new refresh tokens as well as access tokens or id tokens with an
|
|
|
|
up-to-date expiration. For more information read these docs about [token lifespan].
|
|
|
|
|
|
|
|
### enable_client_debug_messages
|
|
|
|
<div markdown="1">
|
|
|
|
type: boolean
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
default: false
|
|
|
|
{: .label .label-config .label-blue }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
|
|
|
|
|
|
|
Allows additional debug messages to be sent to the clients.
|
|
|
|
|
|
|
|
### minimum_parameter_entropy
|
|
|
|
<div markdown="1">
|
|
|
|
type: integer
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
default: 8
|
|
|
|
{: .label .label-config .label-blue }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
|
|
|
|
|
|
|
This controls the minimum length of the `nonce` and `state` parameters.
|
|
|
|
|
|
|
|
***Security Notice:*** Changing this value is generally discouraged, reducing it from the default can theoretically make
|
|
|
|
certain scenarios less secure. It highly encouraged that if your OpenID Connect RP does not send these parameters or
|
|
|
|
sends parameters with a lower length than the default that they implement a change rather than changing this value.
|
|
|
|
|
2021-05-05 05:06:05 +07:00
|
|
|
### clients
|
|
|
|
|
|
|
|
A list of clients to configure. The options for each client are described below.
|
|
|
|
|
|
|
|
#### id
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
<div markdown="1">
|
|
|
|
type: string
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
required: yes
|
|
|
|
{: .label .label-config .label-red }
|
|
|
|
</div>
|
2021-05-05 05:06:05 +07:00
|
|
|
|
|
|
|
The Client ID for this client. Must be configured in the application consuming this client.
|
|
|
|
|
|
|
|
#### description
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
<div markdown="1">
|
|
|
|
type: string
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
default: *same as id*
|
|
|
|
{: .label .label-config .label-blue }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
2021-05-05 05:06:05 +07:00
|
|
|
|
|
|
|
A friendly description for this client shown in the UI. This defaults to the same as the ID.
|
|
|
|
|
|
|
|
#### secret
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
<div markdown="1">
|
|
|
|
type: string
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
required: yes
|
|
|
|
{: .label .label-config .label-red }
|
|
|
|
</div>
|
2021-05-05 05:06:05 +07:00
|
|
|
|
|
|
|
The shared secret between Authelia and the application consuming this client. Currently this is stored in plain text.
|
|
|
|
|
|
|
|
#### authorization_policy
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
<div markdown="1">
|
|
|
|
type: string
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
default: two_factor
|
|
|
|
{: .label .label-config .label-blue }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
2021-05-05 05:06:05 +07:00
|
|
|
|
|
|
|
The authorization policy for this client. Either `one_factor` or `two_factor`.
|
|
|
|
|
|
|
|
#### redirect_uris
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
<div markdown="1">
|
|
|
|
type: list(string)
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
required: yes
|
|
|
|
{: .label .label-config .label-red }
|
|
|
|
</div>
|
2021-05-05 05:06:05 +07:00
|
|
|
|
|
|
|
A list of valid callback URL's this client will redirect to. All other callbacks will be considered unsafe. The URL's
|
|
|
|
are case-sensitive.
|
|
|
|
|
|
|
|
#### scopes
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
<div markdown="1">
|
|
|
|
type: list(string)
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
default: openid, groups, profile, email
|
|
|
|
{: .label .label-config .label-blue }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
2021-05-05 05:06:05 +07:00
|
|
|
|
|
|
|
A list of scopes to allow this client to consume. See [scope definitions](#scope-definitions) for more information.
|
|
|
|
|
|
|
|
#### grant_types
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
<div markdown="1">
|
|
|
|
type: list(string)
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
default: refresh_token, authorization_code
|
|
|
|
{: .label .label-config .label-blue }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
2021-05-05 05:06:05 +07:00
|
|
|
|
|
|
|
A list of grant types this client can return. It is recommended that this isn't configured at this time unless you know
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
what you're doing. Valid options are: `implicit`, `refresh_token`, `authorization_code`, `password`,
|
|
|
|
`client_credentials`.
|
2021-05-05 05:06:05 +07:00
|
|
|
|
|
|
|
#### response_types
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
<div markdown="1">
|
|
|
|
type: list(string)
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
default: code
|
|
|
|
{: .label .label-config .label-blue }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
2021-05-05 05:06:05 +07:00
|
|
|
|
|
|
|
A list of response types this client can return. It is recommended that this isn't configured at this time unless you
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
know what you're doing. Valid options are: `code`, `code id_token`, `id_token`, `token id_token`, `token`,
|
|
|
|
`token id_token code`.
|
|
|
|
|
|
|
|
#### response_modes
|
|
|
|
<div markdown="1">
|
|
|
|
type: list(string)
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
default: form_post, query, fragment
|
|
|
|
{: .label .label-config .label-blue }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
|
|
|
|
|
|
|
A list of response modes this client can return. It is recommended that this isn't configured at this time unless you
|
|
|
|
know what you're doing. Potential values are `form_post`, `query`, and `fragment`.
|
2021-05-05 05:06:05 +07:00
|
|
|
|
2021-07-10 11:56:33 +07:00
|
|
|
#### userinfo_signing_algorithm
|
|
|
|
<div markdown="1">
|
|
|
|
type: string
|
|
|
|
{: .label .label-config .label-purple }
|
|
|
|
default: none
|
|
|
|
{: .label .label-config .label-blue }
|
|
|
|
required: no
|
|
|
|
{: .label .label-config .label-green }
|
|
|
|
</div>
|
|
|
|
|
|
|
|
The algorithm used to sign the userinfo endpoint responses. This can either be `none` or `RS256`.
|
|
|
|
|
2021-05-05 05:06:05 +07:00
|
|
|
## Scope Definitions
|
|
|
|
|
|
|
|
### openid
|
|
|
|
|
|
|
|
This is the default scope for openid. This field is forced on every client by the configuration
|
|
|
|
validation that Authelia does.
|
|
|
|
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
|JWT Field|JWT Type |Authelia Attribute|Description |
|
|
|
|
|:-------:|:-----------:|:----------------:|:-------------------------------------------:|
|
|
|
|
|sub |string |Username |The username the user used to login with |
|
|
|
|
|scope |string |scopes |Granted scopes (space delimited) |
|
|
|
|
|scp |array[string]|scopes |Granted scopes |
|
|
|
|
|iss |string |hostname |The issuer name, determined by URL |
|
|
|
|
|at_hash |string |_N/A_ |Access Token Hash |
|
|
|
|
|aud |array[string]|_N/A_ |Audience |
|
|
|
|
|exp |number |_N/A_ |Expires |
|
|
|
|
|auth_time|number |_N/A_ |The time the user authenticated with Authelia|
|
|
|
|
|rat |number |_N/A_ |The time when the token was requested |
|
|
|
|
|iat |number |_N/A_ |The time when the token was issued |
|
|
|
|
|jti |string(uuid) |_N/A_ |JWT Identifier |
|
2021-05-05 05:06:05 +07:00
|
|
|
|
|
|
|
### groups
|
|
|
|
|
|
|
|
This scope includes the groups the authentication backend reports the user is a member of in the token.
|
|
|
|
|
|
|
|
|JWT Field|JWT Type |Authelia Attribute|Description |
|
|
|
|
|:-------:|:-----------:|:----------------:|:--------------------:|
|
|
|
|
|groups |array[string]|Groups |The users display name|
|
|
|
|
|
|
|
|
### email
|
|
|
|
|
|
|
|
This scope includes the email information the authentication backend reports about the user in the token.
|
|
|
|
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
|JWT Field |JWT Type |Authelia Attribute|Description |
|
|
|
|
|:------------:|:-----------:|:----------------:|:-------------------------------------------------------:|
|
|
|
|
|email |string |email[0] |The first email address in the list of emails |
|
|
|
|
|email_verified|bool |_N/A_ |If the email is verified, assumed true for the time being|
|
|
|
|
|alt_emails |array[string]|email[1:] |All email addresses that are not in the email JWT field |
|
2021-05-05 05:06:05 +07:00
|
|
|
|
|
|
|
### profile
|
|
|
|
|
|
|
|
This scope includes the profile information the authentication backend reports about the user in the token.
|
|
|
|
|
|
|
|
|JWT Field|JWT Type|Authelia Attribute|Description |
|
|
|
|
|:-------:|:------:|:----------------:|:--------------------:|
|
|
|
|
|name |string | display_name |The users display name|
|
|
|
|
|
2021-07-10 11:56:33 +07:00
|
|
|
## Endpoint Implementations
|
|
|
|
|
|
|
|
This is a table of the endpoints we currently support and their paths. This can be requrired information for some RP's,
|
|
|
|
particularly those that don't use [discovery](https://openid.net/specs/openid-connect-discovery-1_0.html). The paths are
|
|
|
|
appended to the end of the primary URL used to access Authelia. For example in the Discovery example provided you access
|
|
|
|
Authelia via https://auth.example.com, the discovery URL is https://auth.example.com/.well-known/openid-configuration.
|
|
|
|
|
|
|
|
|Endpoint |Path |
|
|
|
|
|:-----------:|:------------------------------:|
|
|
|
|
|Discovery |.well-known/openid-configuration|
|
|
|
|
|JWKS |api/oidc/jwks |
|
|
|
|
|Authorization|api/oidc/authorize |
|
|
|
|
|Token |api/oidc/token |
|
|
|
|
|Introspection|api/oidc/introspect |
|
|
|
|
|Revoke |api/oidc/revoke |
|
|
|
|
|Userinfo |api/oidc/userinfo |
|
|
|
|
|
2021-05-05 05:06:05 +07:00
|
|
|
|
feat(oidc): add additional config options, accurate token times, and refactoring (#1991)
* This gives admins more control over their OIDC installation exposing options that had defaults before. Things like lifespans for authorize codes, access tokens, id tokens, refresh tokens, a option to enable the debug client messages, minimum parameter entropy. It also allows admins to configure the response modes.
* Additionally this records specific values about a users session indicating when they performed a specific authz factor so this is represented in the token accurately.
* Lastly we also implemented a OIDC key manager which calculates the kid for jwk's using the SHA1 digest instead of being static, or more specifically the first 7 chars. As per https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-web-key#section-8.1.1 the kid should not exceed 8 chars. While it's allowed to exceed 8 chars, it must only be done so with a compelling reason, which we do not have.
2021-07-04 06:44:30 +07:00
|
|
|
[OpenID Connect]: https://openid.net/connect/
|
|
|
|
[token lifespan]: https://docs.apigee.com/api-platform/antipatterns/oauth-long-expiration
|