-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GitLab OpenID scope #35
Comments
see #36 Is "openid" always a usable and better choice than "api" when using the GitLab provider? |
A token for the The documentation also states to use |
Right, so, I don't see the "openid" scope listed at https://docs.gitlab.com/ee/user/profile/personal_access_tokens.html#limiting-scopes-of-a-personal-access-token and it's only mentioned in a single place in https://docs.gitlab.com/ee/integration/openid_connect_provider.html#enabling-openid-connect-for-oauth-applications and it's not clear to me that it is appropriate for the oauth2_proxy purpose and allows access to group membership. Anyway, I've updated #36 to use the "openid" scope. Can you build that PR and validate that it works for your setup? |
Will try, thanks.
…On Mon, 29 Apr 2019 at 19:26, Pierce Lopez ***@***.***> wrote:
Right, so, I don't see the "openid" scope listed at
https://docs.gitlab.com/ee/user/profile/personal_access_tokens.html#limiting-scopes-of-a-personal-access-token
and it's only mentioned in a single place in
https://docs.gitlab.com/ee/integration/openid_connect_provider.html#enabling-openid-connect-for-oauth-applications
and it's not clear to me that it is appropriate for the oauth2_proxy
purpose and allows access to group membership.
Anyway, I've updated #36 <#36>
to use the "openid" scope. Can you build that PR and validate that it works
for your setup?
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#35 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AAMRV7CFIHOP5UHORQHT6FDPS4VT7ANCNFSM4HH7CGMQ>
.
|
Any news about how "openid" scope works for you? I'm inclined to go back to "api" scope by default (when groups are specified) but with the fix of allowing to override that with the command-line option. This would be a smaller behavior change, and if a few different users report that overriding scope to "openid" works, that change can be made separately in a later release. A GitLab group PR in the other fork also uses the "api" scope for groups: https://github.com/pusher/oauth2_proxy/pull/137/files#diff-83fab261d52ee47763d81d669a7b7b74R107 |
When using this with a GitLab application that has the
openid
scope configured, thegitlab
provider requests anapi
scope. This also happens when-scope="openid"
is set.For securing least priviledge, it could be nice to only request an
openid
scope from the GitLab OpenID Connect application.The text was updated successfully, but these errors were encountered: