summary refs log tree commit diff
path: root/docs/openid.md (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Support OIDC backchannel logouts (#11414)Quentin Gliech2022-10-311-0/+14
| | | | | | | If configured an OIDC IdP can log a user's session out of Synapse when they log out of the identity provider. The IdP sends a request directly to Synapse (and must be configured with an endpoint) when a user logs out.
* Document Google OpenID Connect email attribute (#14081)Paul Tötterman2022-10-071-1/+2
|
* openid.md: fix a typo in the facebook exampleRichard van der Hoff2022-10-061-1/+1
|
* Update openid.md (#13568)nilsKr32022-08-231-1/+3
| | | Linking the help article may prevent confusion regarding the creation of the necessary rule using auth0.
* Cleanup references to sample config in the docs and redirect users to ↵Shay2022-06-301-2/+2
| | | | configuration manual (#13077)
* openid.md: fix some linksRichard van der Hoff2022-05-191-9/+9
| | | docbook doesn't auto-linkify links
* Update issuer URL in example OIDC Keycloak config (#12727)Niklas2022-05-131-1/+1
| | | | | | | * Update openid.md Newer versions of keycloak returning a 404 when using the `/auth` prefix. Related: https://github.com/matrix-org/synapse/issues/12714
* Authentik OpenID minor doc update (#12275)IronTooch2022-03-251-1/+3
|
* Update documentation for configuring facebook login (#11755)Richard van der Hoff2022-01-171-12/+13
| | | ... and a minor thinko fix in the sample config.
* Update openid.mdRichard van der Hoff2021-12-011-1/+1
| | | fix header level
* Remove mention of OIDC certification from Dex (#11470)Etienne Dysli Metref2021-12-011-1/+1
| | | | | | | Dex isn't yet [1,2] a certified OpenID Provider implementation. As of today, it's not on the list maintained by the OpenID Foundation. [3] [1] https://github.com/dexidp/dex/issues/42 [2] https://github.com/dexidp/dex/issues/262 [3] https://openid.net/certification/
* Add doc to integrate synapse with LemonLDAP OIDC (#11257)Julian2021-11-051-0/+38
| | | | Co-authored-by: David Robertson <david.m.robertson1@gmail.com> Co-authored-by: Julian Vanden Broeck <julian.vandenbroeck@dalibo.com>
* docs/openid: Add Authentik documentation. (#11151)Skyler Mäntysaari2021-10-281-0/+34
|
* doc: add django-oauth-toolkit to oidc doc (#10192)Hugo DELVAL2021-08-231-0/+48
| | | | Signed-off-by: Hugo Delval <hugo.delval@gmail.com>
* Fix the titles in the OIDC documentation (#10639)Andrew Morgan2021-08-231-6/+10
| | | | | | | | | | * Fix the titles in the OIDC documentation Having them as links broke the table-of-contents rendering in mdbook. Plus there's no reason for only some of the provider titles to be links. * Changelog * Add link to google idp docs
* Fix the hierarchy of OpenID providers in the docs. (#10445)Patrick Cloke2021-07-211-1/+1
|
* Add support for stable MSC2858 API (#9617)Richard van der Hoff2021-03-161-4/+4
| | | | | The stable format uses different brand identifiers, so we need to support two identifiers for each IdP.
* JWT OIDC secrets for Sign in with Apple (#9549)Richard van der Hoff2021-03-091-3/+39
| | | | | Apple had to be special. They want a client secret which is generated from an EC key. Fixes #9220. Also fixes #9212 while I'm here.
* Fix OIDC gitiea redirect URL. (#9404)Marcus2021-02-161-1/+1
| | | | Fixes a "conflict" from 846b9d3df033be1043710e49e89bcba68722071e and d1f13c7485768b45bfc1a2a674830c681c52e2a1.
* Add XWiki OIDC provider example. (#9324)Thomas Mortagne2021-02-091-0/+22
|
* Put OIDC callback URI under /_synapse/client. (#9288)Richard van der Hoff2021-02-011-9/+10
|
* Add an OpenID example config for Gitea. (#9134)Oliver Hanikel2021-02-011-0/+34
|
* Merge branch 'social_login' into developRichard van der Hoff2021-01-281-0/+3
|\
| * Add 'brand' field to MSC2858 response (#9242)Richard van der Hoff2021-01-271-0/+3
| | | | | | | | | | | | We've decided to add a 'brand' field to help clients decide how to style the buttons. Also, fix up the allowed characters for idp_id, while I'm in the area.
* | Add notes on integrating with Facebook for SSO login. (#9244)Richard van der Hoff2021-01-271-5/+48
|/
* Land support for multiple OIDC providers (#9110)Richard van der Hoff2021-01-151-97/+104
| | | | | | | | | | | | | | | | | | | | | | | This is the final step for supporting multiple OIDC providers concurrently. First of all, we reorganise the config so that you can specify a list of OIDC providers, instead of a single one. Before: oidc_config: enabled: true issuer: "https://oidc_provider" # etc After: oidc_providers: - idp_id: prov1 issuer: "https://oidc_provider" - idp_id: prov2 issuer: "https://another_oidc_provider" The old format is still grandfathered in. With that done, it's then simply a matter of having OidcHandler instantiate a new OidcProvider for each configured provider.
* Keycloak mapping_provider example (#9037) (#9057)Christopher Rücker2021-01-081-0/+4
| | | | | This PR adds the missing user_mapping_provider section in oidc.md Signed-off-by: Christopher Rücker chris-ruecker@protonmail.com
* typoMatthew Hodgson2020-11-021-1/+1
|
* Added basic instructions for Azure AD to OpenId documentation (#8582)Peter Krantz2020-10-261-0/+26
| | | Signed-off-by: Peter Krantz peter.krantz@gmail.com
* Fix filepath of Dex example config (#8657)Andrew Morgan2020-10-261-3/+2
|
* Correct the package name in authlib install instructionsAndrew Morgan2020-10-221-1/+1
|
* Add config option for always using "userinfo endpoint" for OIDC (#7658)BBBSnowball2020-10-011-9/+32
| | | This allows for connecting to certain IdPs, e.g. GitLab.
* Add instructions for authing with Keycloak via OpenID (#7659)hungrymonkey2020-06-161-0/+44
|
* Cleanups to the OpenID Connect integration (#7628)Richard van der Hoff2020-06-031-0/+206
docs, default configs, comments. Nothing very significant.