-
Notifications
You must be signed in to change notification settings - Fork 61
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OpenID Connect (OAuth 2.0) authentication Handler for ACT (references #56) #57
base: master
Are you sure you want to change the base?
Conversation
While installing Crypt::SSLeay, it printed the following message:
Is the Crypt::SSQLeay actually required, or should it be IO::Socket::SSL? |
I did not have test IO::Socket::SSL but it should also work. You can replace Crypt::SSLeay by it if you need. |
LWP::Protocol::https is a better prerequisite than Crypt::SSLeay, then. |
Currently configuring an OpenID Connect provider with Google. In the current way auth is handled Act-side, it will impose quite a burden in terms of administration because each conference that will want to use Google will need to be explicitly declared in Google Console. And I guess things will be similar with other providers. It means that, taking patch.pm as an example, I need to declare: http://patch.pm/p0/OAUTHLOGINCB And that's hoping OAUTHLOGIN is always at the root of the conference (/p2/), and not at a lower level. It would really simplify things if we could redirect to the domain root instead, however, I don't know whether we have enough information to then correctly redirect to the original URL, i.e.: URL -> auth form -> /OAUTHLOGIN -> Google -> /OAUTHLOGINCB -> URL |
Yes, I think we can change this. Maybe this do not require any code change, just adapt the link in the login page, the endpoint in Apache configuration and the configuration of redirecturi in act.ini |
Code made during patch -p2 Hackathon in Lyon. The goal is to be able to log on Act with an external provider like Google.