Replies: 1 comment
-
this requires custom code, hence cannot be managed in configuration only
this also requires custom code, hence cannot be managed in configuration only |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I tried to use kanidm with komga and encountered some issues/confusion. The issues are partly the same as discussed some time ago in #1507.
First I stumbled a bit as I followed the komga documentation for custom oauth2 providers. It says that PKCE can only be activated with
client-authentication-method: none. But this means that komga acts as a public client (see 1 or 2). And the configured basic-secret is not used/required anymore. (In kanidm these clients must be configured differently, since a client with a secret is preferred).According to this issue even private clients can now enable PKCE: spring-projects/spring-security#16382. At least in this issue they added a new configuration key
requireProofKeyto enable PKCE, even withclient-authentication-methodnot set tonone. I tried setting this in theapplication.yml, but this did not fix the problem.Also I did not fully understand, why only
RS256is being supported. (In kanidm this is considered legacy). As far as I understood spring does supportES256- at least according to this issue: spring-projects/spring-security#11799. I also took some time to connect theinvalid_id_tokenerror message with "onlyRS256is supported". Maybe the error message could be added to the documentation for future reference.Both issues are considered insecure in kanidm and therefore I wanted to ask, how/if I could setup an oauth2 provider with PKCE as a private client and
ES256enabled.Anyways, thanks for the great software!
Beta Was this translation helpful? Give feedback.
All reactions