Replies: 1 comment 5 replies
-
you'll really need |
Beta Was this translation helpful? Give feedback.
5 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Configuration:
:80 -> https redirect only
:81 -> http, with oidc auth config, backend port behind a proxy server
:443 -> https, with oidc auth config
I have both hardwired global (outside vhost) OIDCRedirectURI - with full URL (including protocol and port 443).
I have the same OIDCRedirectURI set inside the port 81 and port 443 vhosts.
I have: "RequestHeader set X-Forwarded-Port 443 early" in the vhost configuration on port 81 and port 443 vhosts, along with "X-Forwarded-Proto set https early". (early vs normal did not make any difference in behavior).
The behavior I see seems to depend on whether I'm coming in completely-null, or 'have an IDP session, but not for this server instance', but even that is not consistent -- but after hitting IDP after going to https://server on the proxy, it's redirecting back to https://server:81 (note that it gets the right proto, but wrong port).
If I bypass proxy and hit the server directly on 443, it works fine.
If I get redirected wrong, and then go the original URL again, it immediately let's me in, so it's definitely something about the redirection process where it's getting introduced, I do seem to be able to reproduce by clearing cookies for the site and then hitting the top https://server url again, at which point it kicks me to idp and immediately back to https://server:81
Any ideas on what to look at for this? I am inquiring on getting the X-Forwarded-Port send by the actual proxy in front of this apache instance, but I don't have that in place at this time. It was my understanding that doing it with the RequestHeader set should be sufficient, but it doesn't appear to be reliable.
Beta Was this translation helpful? Give feedback.
All reactions