-
-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
configure openid connect #809
Conversation
…re out how to we want to do key storage in production
…s handled by aspnet it'll result in a redirect loop
…to end up in ID token for testing purposes
UI unit Tests11 tests 11 ✅ 0s ⏱️ Results for commit aabb651. ♻️ This comment has been updated with latest results. |
…e where openId is disabled
# Conflicts: # backend/LexBoxApi/LexBoxApi.csproj # backend/LexData/LexData.csproj
…p and with proper CORS headers
.Add("appName", await applicationManager.GetDisplayNameAsync(application) ?? "Unknown app") | ||
.Add("scope", request.Scope ?? "") | ||
.Add("postback", data); | ||
return Redirect($"/authorize{queryString.Value}"); |
Check warning
Code scanning / CodeQL
URL redirection from remote source
return BadRequest(); | ||
} | ||
|
||
if (IsAcceptRequest()) |
Check failure
Code scanning / CodeQL
User-controlled bypass of sensitive method
…edirects somewhere
…was always null in `CompleteGoogleLogin` due to using the wrong property.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That's all the feedback I have. Everything seems to be working.
It's somewhat unbelievable that this all suddenly exists 😆 👏
# Conflicts: # backend/LexBoxApi/appsettings.Development.json # backend/LexData/Migrations/LexBoxDbContextModelSnapshot.cs
….cs, revert some changes made to vite.config.ts
this PR enables the use of openID connect to authenticate 3rd party apps with lexbox. For now this is disabled except in local dev, it's pending key storage decisions. We need to store signing and encryption keys somewhere and I'm not sure what the best option is right now for production.
How to test:
http://localhost:3000/api/login/open-id-auth
becf2856-0690-434b-b192-a4032b72067f
openid profile
ReturnUrl
query parameter in the URL, login like normal (google login unknown?), once login is finished proceed to the next stepif you want to test out the access token (first box, very large token), you can execute a request like this:
it should return success with your users name. This represents a token that could be used by a 3rd party app like Language Forge, FLEx lite, or Living Dictionaries to access APIs on behalf of the user.
flow diagram: