mirror of
https://github.com/plankanban/planka.git
synced 2026-02-25 03:14:50 +03:00
OIDC with FortiAuthenticator #467
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @nicedevil007 on GitHub (Apr 8, 2024).
Hey guys, I'm trying to get OIDC working with our FortiAuthenticator.
Unfortunately I can't get anything up and running.
My planka systemd service stops with the following message:
Here is my config:
So here a quick overview of the network that is all this in:
Network A: planka is hosted on seperate Ubuntu VM (it is installed with manual install method)
Network B: Nginx Proxy Manager that forwards traffic going to https://planka.email.server to the Network A VM with Planka running on it
Network C: FortiAuthenticator
Ofc: All firewall rules to reach the one or other Network are up and running and nothing is blocked so far (at least this is what my logs tell me ;D)
If I disable all OIDC env variables it is working with local logins.
@meltyshev commented on GitHub (Apr 8, 2024):
Hi! It looks like
openid-clientcan't discover the issuer by the provided URL:Please try to navigate to the address of your issuer
https://auth.mydomain.org/api/v1/oauthin a browser and see where you will be redirected to and specify the final address. It's also possible that you need to put a slash at the end ofhttps://auth.mydomain.org/api/v1/oauth/(but it's just a guess why redirection is done).@nicedevil007 commented on GitHub (Apr 9, 2024):
Ok I tested this with
/and without.Not working at all.
This is what I have available as URL on my FortiAuthenticator.
So what should I take from these ones?
@meltyshev commented on GitHub (Apr 10, 2024):
The response looks correct. It's very hard to say why this might be happening. We'll try to test with FortiAuthenticator sometime or maybe someone has already encountered this and can tell us how to solve it.
@nicedevil007 commented on GitHub (Jun 10, 2024):
Ok got a bit further but without succesfull login. I just changed the OIDC_ISSUER URL to this here:
Now our fortiauthenticator tells me (after succesfull login to the FAC)

Is it even possible to not use the auto config method but use the method where we have to add all URI's by ourselfes?
@nicedevil007 commented on GitHub (Jun 24, 2024):
Got a bit further, now Planka tells me that an unknown error appeared, where can I find those logs to get a bit more information about the error?
@nicedevil007 commented on GitHub (Jun 24, 2024):
Found this in the docker logs:
@nicedevil007 commented on GitHub (Jun 24, 2024):
If I do what is telling me the error message (removing
/.well-known/openid-configuration/from the expected URI) it leads to this error in the docker logs:Now I would assume this is an error because planka is behind a reverseproxy?
@nicedevil007 commented on GitHub (Sep 9, 2024):
Is there anything new here?
@meltyshev commented on GitHub (Aug 9, 2025):
This issue may have been resolved by https://github.com/plankanban/planka/pull/1290. Please feel free to reopen if it's still not fixed or if anyone else encounters it.