Hi, I thought that MIT and ISC have no difference in their permissivness ? You can do what ever you want with MIT ... I do not understand what kind of additional module would need to be maintained by a university? I am using OIDC at home for most of my self hosted infrastructure and I am not maintaining any code for doing that. I just set up an OIDC provider like Keycloak and configure the OIDC enabled applications to use the keycloak provided https API. I am not so used to oauth2 but my understanding...
Hi there, sorry for my very late reply but I had family issues to solve and two research projects to get new funding for so my time for administrative projects has been very limitted. At the moment it is not that urgant to get it running as I have to ensure continous funding of some of my team members. But I can help you test. My PHP programming skills are very very rusty as I am more into VHDL and Assembler coding these days. Yeah that is my github account and there is already a docker image published...
Hi there, there for my very late reply but I had family issues to solve and two research projects to get new funding for so my time for administrative projects has been very limitted. At the moment it is not that urgant to get it running as I have to ensure continous funding of some of my team members. But I can help you test. My PHP programming skills are very very rusty as I am more into VHDL and Assembler coding these days. Yeah that is my github account and there is already a docker image published...
I think they are similar but OIDC is the more modern protocol.
Hi, yes I was referring to that ticket. oauth and OIDC are both used for SSO because they provide an authentication cookie to the applications. In case of proxy-auth it is not a cookie but an http header field. I think, that when not having the flag or the information that the authentication has already been made, Wikindx can just display its normal authentication page or, depending if you want to make it configurable, can just present access denied. If the flag or the information about an already...
Well, that was my suggestion, as you already denied a request for oauth support and I wanted to find a solution which is easy and fast to implement. I use e.g. https://github.com/grocy/grocy behind proxy-auth
Hi Stéphane, for proxy-auth you do not need any experience with oauth2 or OIDC. In general proxy-auth uses the feature of http-auth. If you are using http-auth of any webserver the logged in user will be provided within the http response header for example just as HTTP_REMOTE_USER. If you run a wikindx instance on apache or nginx and add http-auth to the location of wikindx you will get such an http repsonse header. So for testing purposes that is enough. I can provide an oauth2-proxy instance for...
support proxy-auth as an authentication mechanism