-
-
Notifications
You must be signed in to change notification settings - Fork 221
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support to the CHT api for new endpoint for OIDC login #9765
Comments
@jkuester please assign me this ticket |
@benkags Done! |
|
🤔 So, I don't think TS should be a problem here. In my experience, TS projects like this typically transpile everything down to JS files before publishing to NPM (along with the TS declaration files). Then the NPM package can be consumed by either JS or TS projects. Can you share the specific problems you are encountering trying to pull in
I think we should try to stick with a generic OIDC client library for our actual implementation code (since we want to support connecting to any valid OIDC provider and not just KeyCloak). |
You are right @jkuester: code. I'll explore that. I agree with you using |
I've got a working end to end flow using |
Work items break-down
|
/medic/login/oidc
endpoint should supportGET
requests with acode
query param. Thecode
should be theauthorization_code
coming from the OIDC Provider.getOidc
function inapi/src/controllers/login.js
that will handle the request and call through to code in theopenid-client
to validate theauthorization_code
.authorization_code
, the OIDC Provider should return anid_token
containing the username for the authenticated user._user
and confirmoidc_provider
value is setsecret
value which can be requested from the Couch instance. There is some code in the proxy auth PR that does this. I think we might be able to put that functionality for getting the secret intoshared-libs/settings
(or maybe that code is already sufficient for retrieving the secret value?).The text was updated successfully, but these errors were encountered: