You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
OIDC-aware Element Web examines the list of available login flows (see Login.ts) and if we find a OIDC one masquerading as an SSO flow, we only display that.
For native OIDC we will use the homeserver .well-known to determine OIDC support. When client .well-known includes a valid m.authentication section MSC2965 consider OIDC enabled.
Client implementation guide
Is homeserver OIDC enabled?
OIDC-aware Element Web examines the list of available login flows (see Login.ts) and if we find a OIDC one masquerading as an SSO flow, we only display that.
For native OIDC we will use the homeserver
.well-known
to determine OIDC support. When client.well-known
includes a validm.authentication
section MSC2965 consider OIDC enabled.This implementation will rely on .well-known to determine OIDC support. Not all Matrix servers have the well-known client discovery mechanism setup, so will be unable to discover the auth server. If a user enters a matrix server url instead of a server name, we will be unable to discover the auth server.
Alternative methods of auth server discovery might be addressed later.
AC:
m.authentication
section from client.well-known
inbuildValidatedConfigFromDiscovery
m.authentication
config is found, fetch.well-known/openid-configuration
from the configuredissuer
Required properties are:
authorization_endpoint
token_endpoint
registration_endpoint
response_types_supported
includescode
response_modes_supported
includesfragment
grant_types_supported
includesauthorization_code
code_challenge_methods_supported
includesS256
See https://github.com/sandhose/matrix-doc/blob/msc/sandhose/oauth2-profile/proposals/2964-oauth2-profile.md#native-and-browser-based-clients
The text was updated successfully, but these errors were encountered: