Add support for OAuth login #17

Closed
opened 2026-02-04 16:32:24 +03:00 by OVERLORD · 8 comments
Owner

Originally created by @vins345 on GitHub (Feb 25, 2022).

Only login and password is to weak secure for 2022 year :)

Originally created by @vins345 on GitHub (Feb 25, 2022). Only login and password is to weak secure for 2022 year :)
Author
Owner

@n1ckoates commented on GitHub (Mar 29, 2022):

Support for security keys would also be great, if it's not too much of a hassle.

@n1ckoates commented on GitHub (Mar 29, 2022): Support for security keys would also be great, if it's not too much of a hassle.
Author
Owner

@adyanth commented on GitHub (Mar 29, 2022):

I would say instead of rolling your own, it is better to add OAuth2.0/OIDC support and let the identity providers/auth servers like Authelia or KeyCloak do that job of handling users/rules/2FA/security keys etc.

Username and password is indeed weak for 2022 :)

@adyanth commented on GitHub (Mar 29, 2022): I would say instead of rolling your own, it is better to add OAuth2.0/OIDC support and let the identity providers/auth servers like Authelia or KeyCloak do that job of handling users/rules/2FA/security keys etc. Username and password is indeed weak for 2022 :)
Author
Owner

@alextran1502 commented on GitHub (Mar 29, 2022):

@adyanth Thank man, I like this approach. I will look into incorporating them into the application.

@alextran1502 commented on GitHub (Mar 29, 2022): @adyanth Thank man, I like this approach. I will look into incorporating them into the application.
Author
Owner

@erikthegamer1242 commented on GitHub (Mar 31, 2022):

I would say instead of rolling your own, it is better to add OAuth2.0/OIDC support and let the identity providers/auth servers like Authelia or KeyCloak do that job of handling users/rules/2FA/security keys etc.

Username and password is indeed weak for 2022 :)

Please implement Authelia and KeyCloack they are the kings when it comes to self-hosted 2FA

@erikthegamer1242 commented on GitHub (Mar 31, 2022): > I would say instead of rolling your own, it is better to add OAuth2.0/OIDC support and let the identity providers/auth servers like Authelia or KeyCloak do that job of handling users/rules/2FA/security keys etc. > > Username and password is indeed weak for 2022 :) Please implement Authelia and KeyCloack they are the kings when it comes to self-hosted 2FA
Author
Owner

@adyanth commented on GitHub (Mar 31, 2022):

With OIDC in place, it should work with both of them and many many more :)

@adyanth commented on GitHub (Mar 31, 2022): With OIDC in place, it should work with both of them and many many more :)
Author
Owner

@ippocratis commented on GitHub (Mar 31, 2022):

I just finished setting up caddy-security plugin
It does not require any integtagration in the immich side
You just reverse proxy to the imich port on localhost and authorise it with mfa

Reference config

I realised what I just wrote was untrue

Immich app still needs a way to pass the 2fa pin

@ippocratis commented on GitHub (Mar 31, 2022): I just finished setting up [caddy-security](https://authp.github.io) plugin ~~It does not require any integtagration in the immich side~~ You just reverse proxy to the imich port on localhost and authorise it with mfa Reference [config](https://t.me/s/ippossackofhacks/591) I realised what I just wrote was untrue Immich app still needs a way to pass the 2fa pin
Author
Owner

@alextran1502 commented on GitHub (Jun 12, 2022):

The work is being carried on in #207 - Closing this issue

@alextran1502 commented on GitHub (Jun 12, 2022): The work is being carried on in #207 - Closing this issue
Author
Owner

@jrasm91 commented on GitHub (Nov 21, 2022):

Implemented in #884, #990.

@jrasm91 commented on GitHub (Nov 21, 2022): Implemented in #884, #990.
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: immich-app/immich#17