-
-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OpenID Connect #5650
Comments
There's sentry-auth-google which already uses Google's OIC flow, it looks like I can generalize it a bit to make it work with any OIC provider. @dcramer does that sound like a sensible approach, i.e. make a new plugin |
|
@dcramer thanks for the information! Not sure what you mean by "convenience auth" though, OpenID Connect was built for SSO as well. But just to clarify: it's possible to implement this as a standalone plugin similar to |
@toupeira its more the fact that most auth providers aren't really intended for the kind of security we're asking for. Even GitHub is a little problematic, and although what we need can be accomplished via orgs + teams, it's not really their primary goal at the end of the day. Google is the only real mainstream auth provider beyond SAML at this point, and that's definitely what we recommend. |
@dcramer not sure what you think is problematic security-wise with OIC, can you elaborate? It's pretty much a modern replacement for SAML, and again Google is using OIC as well. |
It's not the protocol (which provides very little afaik) it's the service provider. We need providers that:
|
@dcramer I think you're mistaking OpenID Connect with OpenID (confusing naming...). Using OpenID Connect, you can actually define providers, as application. It's just a standardarization layer on top of OAuth2 standardization. Advantage is that you don't need another library for another OAuth2 service, which supports OIC. |
Either way what I said remains true. We don’t want arbitrary oauth services which may or may not be trusted to act as authentication sources. SAML is an exception to this but we tighten the rules around it and consider it a necessary evil. |
I feel like you still don't understand OpenID Connect. It's not arbitrary. You can define allowed providers. It's just a standard for identification. |
For people also looking for this feature, here is a fork with full oidc integration: https://github.com/siemens/sentry-auth-oidc |
Having an officially maintained OAuth2 plugin would be great to have. Having to maintain user accounts and credentials in various place is a security risk. |
can we reopen this issue? |
There is a growing amount of authentication providers with OpenID Connect support , see e.g. http://openid.net/certification/
Are there any plans on providing generic OpenID Connect support instead of adding individual providers?
The text was updated successfully, but these errors were encountered: