mirror of
https://github.com/plankanban/planka.git
synced 2026-02-24 19:08:59 +03:00
SSO Failure, Keycloak #361
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @daanbreur on GitHub (Sep 28, 2023).
It is definitely working, I tested it with 3 and a half idps. Authelia, authentik and keycloak. I also done logto but stopped when it used an opaque token.
Since this pr is already merged and we're resurrecting a completed pr, If you would like to create an issue or discussion then I will see if I can help out further.
Originally posted by @jeffreytyler in https://github.com/plankanban/planka/issues/491#issuecomment-1738283877
@daanbreur commented on GitHub (Sep 28, 2023):
The browserconsole is definitely empty, also the redirect shouldnt be to
/OidcLoginbut to/oidclogincause thats how the path is defined inside the sourcecode. However im getting the same blackpage with no browser or server errorlogs with both paths.@meltyshev commented on GitHub (Sep 29, 2023):
We need to try to reproduce this. Could you show the settings of your Keyclock (of course without private data)?
@daanbreur commented on GitHub (Sep 29, 2023):
@daanbreur commented on GitHub (Sep 30, 2023):
after digging deep in network logs i found
response coming from a request made to keycloak.
are you maybe able to share your keycloak configurations so we can compare
@gorrilla10101 commented on GitHub (Sep 30, 2023):
on the client in keycloak turn client authentication off. Planka uses authorization code flow with PKCE and logs in from the react app in the browser. So it doesn't use a client secret and that is what the error your getting is.
I believe, will confirm in just a moment, that you need one more mapper to add the audience.
I am working on getting it set back up so I can send you the configuration over as well in just a moment.
@gorrilla10101 commented on GitHub (Sep 30, 2023):
Confirmed working with keycloak.
@daanbreur commented on GitHub (Sep 30, 2023):
Ah ofcourse. Thank you, I completely forgot client authorization isn't required on most of my services i enabled that.
@daanbreur commented on GitHub (Sep 30, 2023):
I might make some additional documentation to add this stuff cause more people might forget like I did