From 69636ae0c7441b22080c478694f661358a4c4294 Mon Sep 17 00:00:00 2001
From: richvdh sub
property, an alternative subject_claim
has to be set.
[synapse public baseurl]/_synapse/client/oidc/callback
.Synapse config:
@@ -436,8 +436,8 @@ does not return asub
property, an alternative subject_claim<
Google
Google is an OpenID certified authentication and authorisation provider.
-- Set up a project in the Google API Console (see
-https://developers.google.com/identity/protocols/oauth2/openid-connect#appsetup).
+- Set up a project in the Google API Console (see
+documentation).
- Add an "OAuth Client ID" for a Web Application under "Credentials".
- Copy the Client ID and Client Secret, and add the following to your synapse config:
oidc_providers:
@@ -596,8 +596,8 @@ private key with "SiWA" enabled.
- Team ID: a 10-character ID associated with your developer account.
- Key ID: the 10-character identifier for the key.
-https://help.apple.com/developer-account/?lang=en#/dev77c875b7e has more
-documentation on setting up SiWA.
+Apple's developer documentation
+has more information on setting up SiWA.
The synapse config will look like this:
- idp_id: apple
idp_name: Apple
@@ -624,10 +624,10 @@ needed to add OAuth2 capabilities to your Django projects. It supports
OpenID Connect too.
Configuration on Django's side:
-- Add an application: https://example.com/admin/oauth2_provider/application/add/ and choose parameters like this:
+- Add an application:
https://example.com/admin/oauth2_provider/application/add/
and choose parameters like this:
-Redirect uris
: https://synapse.example.com/_synapse/client/oidc/callback
+Redirect uris
: https://synapse.example.com/_synapse/client/oidc/callback
Client type
: Confidential
Authorization grant type
: Authorization code
Algorithm
: HMAC with SHA-2 256
--
cgit 1.4.1