-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix Okta OIDC #11718
Fix Okta OIDC #11718
Conversation
For release notes: This fixes the following error when attempting to use Okta as an OIDC provider: |
@russjones in order to get Okta OIDC working you need this PR and you also need to set Any objection to adding support for |
Yeah, add I had to do something similar for JumpCloud: #11805 |
4551f4c
to
f4aa4de
Compare
f4aa4de
to
966bae4
Compare
Using the OIDC connector with Okta would fail due to an issue in our fork of go-oidc. Update this dependency to get the fix. Additionally, clean up the logic for syncing the connector configuration, which was using a context.Context in order to implement a timeout. This can be expressed in a simpler way with time.After()
966bae4
to
eeacf60
Compare
Using the OIDC connector with Okta would fail due to an issue in our fork of go-oidc. Update this dependency to get the fix. Additionally, clean up the logic for syncing the connector configuration, which was using a context.Context in order to implement a timeout. This can be expressed in a simpler way with time.After()
Using the OIDC connector with Okta would fail due to an issue in our fork of go-oidc. Update this dependency to get the fix. Additionally, clean up the logic for syncing the connector configuration, which was using a context.Context in order to implement a timeout. This can be expressed in a simpler way with time.After()
Using the OIDC connector with Okta would fail due to an issue in our fork of go-oidc. Update this dependency to get the fix. Additionally, clean up the logic for syncing the connector configuration, which was using a context.Context in order to implement a timeout. This can be expressed in a simpler way with time.After()
This is the docs counterpart to #11718
Using the OIDC connector with Okta would fail due to an issue in our fork of go-oidc. Update this dependency to get the fix. Additionally, clean up the logic for syncing the connector configuration, which was using a context.Context in order to implement a timeout. This can be expressed in a simpler way with time.After()
Using the OIDC connector with Okta would fail due to an issue in our fork of go-oidc. Update this dependency to get the fix. Additionally, clean up the logic for syncing the connector configuration, which was using a context.Context in order to implement a timeout. This can be expressed in a simpler way with time.After()
Using the OIDC connector with Okta would fail due to an issue in our fork of go-oidc. Update this dependency to get the fix. Additionally, clean up the logic for syncing the connector configuration, which was using a context.Context in order to implement a timeout. This can be expressed in a simpler way with time.After()
Using the OIDC connector with Okta would fail due to an issue in our fork of go-oidc. Update this dependency to get the fix. Additionally, clean up the logic for syncing the connector configuration, which was using a context.Context in order to implement a timeout. This can be expressed in a simpler way with time.After()
* Document Okta OIDC provider workaround This is the docs counterpart to #11718 * Update docs/pages/enterprise/sso.mdx Co-authored-by: Paul Gottschling <[email protected]> Co-authored-by: Paul Gottschling <[email protected]>
* Document Okta OIDC provider workaround This is the docs counterpart to #11718 * Update docs/pages/enterprise/sso.mdx Co-authored-by: Paul Gottschling <[email protected]> Co-authored-by: Paul Gottschling <[email protected]>
* Document Okta OIDC provider workaround This is the docs counterpart to #11718 * Update docs/pages/enterprise/sso.mdx Co-authored-by: Paul Gottschling <[email protected]> Co-authored-by: Paul Gottschling <[email protected]>
* Document Okta OIDC provider workaround This is the docs counterpart to #11718 * Update docs/pages/enterprise/sso.mdx Co-authored-by: Paul Gottschling <[email protected]> Co-authored-by: Paul Gottschling <[email protected]>
Using the OIDC connector with Okta would fail due to an issue in our fork of go-oidc. Update this dependency to get the fix. Additionally, clean up the logic for syncing the connector configuration, which was using a context.Context in order to implement a timeout. This can be expressed in a simpler way with time.After()
Using the OIDC connector with Okta would fail due to an issue in our fork of go-oidc. Update this dependency to get the fix. Additionally, clean up the logic for syncing the connector configuration, which was using a context.Context in order to implement a timeout. This can be expressed in a simpler way with time.After()
Using the OIDC connector with Okta would fail due to an issue in our fork of go-oidc. Update this dependency to get the fix. Additionally, clean up the logic for syncing the connector configuration, which was using a context.Context in order to implement a timeout. This can be expressed in a simpler way with time.After()
This is the docs counterpart to #11718 Backports #11948 Co-authored-by: Paul Gottschling <[email protected]>
This is the docs counterpart to #11718 Co-authored-by: Paul Gottschling <[email protected]>
This is the docs counterpart to #11718 Co-authored-by: Paul Gottschling <[email protected]>
Using the OIDC connector with Okta would fail due to an issue in our
fork of go-oidc. Update this dependency to get the fix.
Additionally, clean up the logic for syncing the connector
configuration, which was using a context.Context in order to implement
a timeout. This can be expressed in a simpler way with time.After()