Skip to content
Snippets Groups Projects

README: Point out some subtleties around client auth methods

Merged Emanuele Aina requested to merge wip/em/client-auth-basic-docs into main
Files
2
+ 15
1
@@ -120,7 +120,6 @@ GITLAB_OMNIBUS_CONFIG: |
'scope' => ['openid', 'profile', 'email'],
'response_type' => 'code',
'issuer' => 'http://${oidc-provider}:${oidc-provider-port:-5556}/dex',
'client_auth_method' => 'query',
'discovery' => false, # GitLab discovery expects HTTPS
'uid_field' => 'preferred_username',
'client_options' => {
@@ -137,6 +136,21 @@ GITLAB_OMNIBUS_CONFIG: |
]
```
Note that for the [OpenID-Connect spec](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication)
`basic` is the default client auth method if no different mechanism is
configured at the client registration time.
Quoting the [GitLab documentation](https://docs.gitlab.com/ee/administration/auth/oidc.html):
> - `client_auth_method` (optional) specifies the method used for authenticating
> the client with the OpenID Connect provider.
> - Supported values are:
> - `basic` - HTTP Basic Authentication.
> - `jwt_bearer` - JWT-based authentication (private key and client secret signing).
> - `mtls` - Mutual TLS or X.509 certificate validation.
> - Any other value posts the client ID and secret in the request body.
> - If not specified, this value defaults to `basic`.
Remember to open `80` port and [create API token](https://docs.gitlab.com/ee/user/profile/personal_access_tokens.html#create-a-personal-access-token-programmatically) for later use by the AuthZ mediator.
### AuthZ mediator
Loading