-
|
Hello, I have a problem which I'm not sure I can configure around, or if it needs a change in mod_auth_openidc. I'm using Apache 2.4.41 and mod_auth_openidc 2.4.1 from out-of-the-box Ubuntu 20.04. Here's the scenario:
Now I add mod_auth_openidc on the Apache server, and I can almost get this to work. The client is redirected to the IDP, is redirected back with auth code, and I'm pretty sure mod_auth_openidc is exchanging the auth code for an ID token. But at the very final step, mod_auth_openidc is redirecting the client to Here are the relevant parts of my config. Firstly, a dummy vhost to enable proxy_protocol on port 10443 only: Then the real vhost for The OIDC configuration settings are global: Note that I have overridden As I say, it works right up to the very last step. The client gets redirected back to I was hoping that a combination of would make the redirect go to the right place, but it doesn't, and I can't find any more settings which might affect this. Any clues? Thanks! P.S. mod_auth_openidc is awesome: it's the one OIDC RP implementation that I can consistently rely on :-) |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 2 replies
-
|
the proxy needs to set |
Beta Was this translation helpful? Give feedback.
the proxy needs to set
X-Forwarded-Portto make mod_auth_openidc aware of the external port number, see: https://github.com/zmartzone/mod_auth_openidc/wiki#8-how-do-i-run-mod_auth_openidc-behind-a-reverse-proxy