-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to configure OIDC on different authorization servers #69
Comments
Any possibility of keycloak being added here too please? 👍 |
Reminder: |
Question for you guys - I'm trying to figure out how to properly configure Azure AD for OIDC authentication and am almost there but I get back the following error: Failed exchanging authorization code: json: cannot unmarshal string into Go struct field token.expires_in of type int Any idea what I may be missing on the Microsoft side of the configuration? |
That's weird. Quick context, a successful OAuth Access Token response looks like:
The error message looks suspiciously like Azure AD is sending the |
Do you happen to have any basic instructions on how you've configured Azure AD? It could very well be a config setting on my end b/c it's the first time I've tried setting up OIDC with Azure. |
@joshathysolate Here some basic instructions:
You can also do this in the UI on
{
"type": "OIDC",
"name": "Azure AD - My Provisioner name",
"clientID": "<client-id>",
"clientSecret": "<client-secret>",
"configurationEndpoint": "https://login.microsoftonline.com/<tenant-id>/v2.0/.well-known/openid-configuration"
} If you end up using the UI, you might need to add |
Using the above instructions I'm also able to run without specifying the --listen address: step oauth --oidc --bare --provider https://login.microsoftonline.com/<tenant-id>/v2.0/.well-known/openid-configuration --client-id <client-id> --client-secret <client-secret> and get the OIDC token. |
Great - it looks close to what I did but I will kill my existing app registration and give this a try instead. Thanks @maraino! |
FYI - it looks like I was using the older configuration endpoint as I was missing the v2.0 in the URL. |
Hello, |
Hi @etudurd, one good example is our DIY SSO for SSH blog post, which will take you through the entire SSH setup, using a Google Cloud OAuth client. While we don't have a specific Keycloak example, the OIDC provisioner for
You may also need to change the Hope this helps! |
Description
Add docs on how to configure an OIDC provisioner on different OAuth 2.0/OpenID Connect providers:
Add to https://smallstep.com/docs/step-ca/integrations#oidc
The text was updated successfully, but these errors were encountered: