OpenID Connect (OAuth 2.0) authentication Handler for ACT (references #56)#57
OpenID Connect (OAuth 2.0) authentication Handler for ACT (references #56)#57coudot wants to merge 3 commits intobook:masterfrom
Conversation
|
While installing Crypt::SSLeay, it printed the following message: Is the Crypt::SSQLeay actually required, or should it be IO::Socket::SSL? |
|
I did not have test IO::Socket::SSL but it should also work. You can replace Crypt::SSLeay by it if you need. |
|
LWP::Protocol::https is a better prerequisite than Crypt::SSLeay, then. |
|
Currently configuring an OpenID Connect provider with Google. In the current way auth is handled Act-side, it will impose quite a burden in terms of administration because each conference that will want to use Google will need to be explicitly declared in Google Console. And I guess things will be similar with other providers. It means that, taking patch.pm as an example, I need to declare: http://patch.pm/p0/OAUTHLOGINCB And that's hoping OAUTHLOGIN is always at the root of the conference (/p2/), and not at a lower level. It would really simplify things if we could redirect to the domain root instead, however, I don't know whether we have enough information to then correctly redirect to the original URL, i.e.: URL -> auth form -> /OAUTHLOGIN -> Google -> /OAUTHLOGINCB -> URL |
|
Yes, I think we can change this. Maybe this do not require any code change, just adapt the link in the login page, the endpoint in Apache configuration and the configuration of redirecturi in act.ini |
Code made during patch -p2 Hackathon in Lyon. The goal is to be able to log on Act with an external provider like Google.