Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request: OIDC Support #148

Open
royaltongue opened this issue Nov 14, 2024 · 4 comments · May be fixed by #171
Open

Feature Request: OIDC Support #148

royaltongue opened this issue Nov 14, 2024 · 4 comments · May be fixed by #171
Labels
enhancement New feature or request

Comments

@royaltongue
Copy link

Instead of having to use just Google, it would be nice to use Authentik, Authlia, etc

@KMKoushik KMKoushik added the enhancement New feature or request label Nov 15, 2024
@gravelfreeman
Copy link

I second this feature request. 2024 has been the year where I've seen global adoption of OIDC and most of the apps I'm using are now supporting OIDC.

I'm using Authelia and I'd like instructions how to set it up. It's possible with next-auth but it's complicated and undocumented.

In the meantime it would be really nice to get instructions to make it work with next-auth/ldap so that my user would use the same credentials everywhere. Not a huge deal with SplitPro since it works with a passwordless magic link to login.

@imnotjames imnotjames linked a pull request Jan 21, 2025 that will close this issue
@imnotjames
Copy link
Contributor

I would like this so I am opening a draft PR. It's not tested yet - nor does it have any tests written. I'll try to clean it up and validate it over the next couple of days.

@Injabie3
Copy link

Injabie3 commented Feb 10, 2025

I can't speak for Authelia, but v1.3.4 works with Authentik. I had to:

  • Pass in the following environment variables:
    • AUTHENTIK_ID (client ID from Authentik)
    • AUTHENTIK_SECRET (client secret from Authentik)
    • AUTHENTIK_ISSUER (OpenID Configuration Issuer from Authentik).
  • Set the callback URL redirect URI to https://yoursplitpro.domain/api/auth/callback/authentik in Authentik

@imnotjames
Copy link
Contributor

imnotjames commented Feb 10, 2025

Did you pass in the authentik provider to the list of providers?

Edit: oh, authentik provider is included https://github.com/oss-apps/split-pro/blob/main/src/server/auth.ts#L172

So that's expected. This issue is intended to be supporting oidc in general, right

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants