Skip to content

feat: support custom oidc server #1815

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 3 commits into
base: develop
Choose a base branch
from
Draft

Conversation

koderx
Copy link

@koderx koderx commented Apr 30, 2025

This PR allows setting a custom OIDC server.
Three fields have been added to MultiFactorAuthentication:

  • issuerBaseUrl: Set the base URL for the OpenID Connect issuer.
  • issuerName: Set the name of the OpenID Connect issuer.
  • issuerIcon: Set the URL of the icon for the OpenID Connect issuer.

This has been tested with Authelia, and if the fields are left empty, it defaults to Google OIDC.

image

Copy link
Member

@pano9000 pano9000 May 4, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

IMHO the added config names should be prefixed with a more descriptive prefix, because reading e.g. TRILIUM_ISSUER_NAME is not really telling me what that is.
Something like TRILIUM_OPENID_ISSUER_NAME or TRILIUM_OIDC_ISSUER_NAME is a lot more clear.
(correct me if my terminology is wrong here though, not a huge expert on OAUTH vs OpenID and how all that is intertwined).

it would also be more "inline" with the other config naming

what do you think?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

regarding the naming -> see comment below as well please :-)

@eliandoran eliandoran added this to the v0.94.0 milestone May 9, 2025
@eliandoran eliandoran marked this pull request as draft May 10, 2025 12:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants