-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
openidconnect 2.2.0 and Duo SSO/code_challenge_methods_supported #246
Comments
Anything in addition in the ownCloud log ? |
Nothing that seems overly useful. Am running with everything logging enabled at present.
|
That is helpful. Thx Any chance you can share the url of your IDP? Thx |
Sure - https://sso-5078d358.sso.duosecurity.com/oidc/DIY305725PR9C3NFKP6A is the base URL; with discovery at https://sso-5078d358.sso.duosecurity.com/oidc/DIY305725PR9C3NFKP6A/.well-known/openid-configuration |
Looks like the 3rd party library change is causing this - will fix that. Thanks a lot! 👍 |
Previously used library uses Fix come up with a fix for this .... |
@andrewyager if I understand the wellknown configuration correctly - duo is not supporting PKCE? Is that true? THX |
Confirmed working now! This does not yet work for app access; but this is a limitation of Duo not yet supporting an offline_access claim which they are in the progress of delivering support for. |
I've asked Duo about this. |
Looks like PKCE is supported by DUO in the meantime: https://duo.com/blog/duo-single-sign-on-support-for-openid-connect-apps-now-generally-available |
Q: shall we add the PKCE (Proof Key for Code Exchange) support requirement in our documentation ? |
PKCE is not a hard requirement. Nothing to document from my pov |
I dont get it. Not a hard requirement, but did not work without... ? |
nobody said this ... |
We've been testing the OIDC 2.2.0 rc1
I have observed the following regression; namely that in the new RC, the following error is thrown in the OwnCloud interface.
The provider code_challenge_methods_supported could not be fetched.
I do note that the Duo OIDC support is still "beta" and we have observed instances of them not fully implementing the OICD specification; however this does work under 2.1.1 and does not work under 2.2.0.
The text was updated successfully, but these errors were encountered: