Available at address: http://localhost:3000/
Verification: use Sign in with HyperOne
button in login form
✔️ HyperOne compatible
Available at address: http://traefik.127.0.0.1.nip.io
Requires:
- traefik - service
traefik
- traefik-forward-auth - service
traefik-forward-auth
Verification: visit address to see user in X-Forwarded-User
✔️ HyperOne compatible
Available at address: http://nginx.127.0.0.1.nip.io
Requires:
- Nginx - service
nginx
- Vouch - service
vouch
Verification: visit address to see e-mail in X-Forwarded-User
❌ HyperOne incompatible, because requires User Info endpoint
Available at address: http://php.127.0.0.1.nip.io
Requires:
- apache2 - service
php
mod_auth_openidc
(Certified Relying Party)
Verification: visit address to see user in $_SERVER['OIDC_CLAIM_email']
To verify Apache2 flow in CLI use:
curl -c /tmp/cookie.json php.127.0.0.1.nip.io -v -L
❌ HyperOne incompatible, because requires nonce
support
Available at address: http://proxy.127.0.0.1.nip.io/
Requires:
- oauth2-proxy - service
proxy
Verification: visit address to see e-mail in X-Forwarded-Email
✔️ HyperOne compatible
Available at address: http://proxy.127.0.0.1.nip.io/
Requires:
- oauth2-proxy - service
nginx-auth
- Nginx - service
nginx-proxy
Verification: visit address to see e-mail in X-Forwarded-Email
✔️ HyperOne compatible
TBD - see traefik in local-environment
To verify flow in CLI use node
as identity provider and following command like:
curl -c /tmp/cookie.json traefik.127.0.0.1.nip.io -v -L
-
Traefik EE support build-in auth processor, but despite of that require static configuration per identity provider. See Traefik EE OpenID Connect Authentication
-
Nginx Plus have build-in auth processor. Alternative lua-resty-openidc (OpenID certified) exist in community.