-
Notifications
You must be signed in to change notification settings - Fork 2k
Add OIDC PKCE configuration through policy #7765
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
done, updated PR text above |
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #7765 +/- ##
==========================================
+ Coverage 52.47% 52.50% +0.03%
==========================================
Files 90 90
Lines 21550 21570 +20
==========================================
+ Hits 11308 11325 +17
- Misses 9773 9775 +2
- Partials 469 470 +1 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
07acf0b
to
b5c701a
Compare
9127a18
to
cb93a06
Compare
Also need to update the existing OIDC example and policy key in docs |
d86ff10
to
bafb76b
Compare
Closes #1782 |
Documentation for keycloak in the main doucmentation repo: nginx/documentation#585 |
b8a8c8b
c4bfa3f
to
b8a8c8b
Compare
fff9b47
to
915e981
Compare
a919e39
to
a87153c
Compare
Proposed changes
Closes #6713
PKCEEnable
property to theOIDC
Policy SpecPKCE flow oauth client requirements
In the test we use keycloak, so the info is specific to that, however please consult your oauth provider on how to set up a client that will use PKCE. For keycloak you need a client that is
S256
Checklist
Before creating a PR, run through this checklist and mark each as complete.