2022-10-20 04:27:09 +00:00
|
|
|
---
|
2023-04-15 12:25:21 +00:00
|
|
|
title: "Frequently Asked Questions"
|
|
|
|
description: "Frequently Asked Questions regarding integrating the Authelia OpenID Connect Provider with an OpenID Connect relying party"
|
2023-04-15 21:48:03 +00:00
|
|
|
lead: "Frequently Asked Questions regarding integrating the Authelia OpenID Connect Provider with an OpenID Connect relying party."
|
2022-10-20 20:41:46 +00:00
|
|
|
date: 2022-10-20T15:27:09+11:00
|
2022-10-20 04:27:09 +00:00
|
|
|
draft: false
|
|
|
|
images: []
|
|
|
|
menu:
|
|
|
|
integration:
|
|
|
|
parent: "openid-connect"
|
|
|
|
weight: 615
|
|
|
|
toc: true
|
|
|
|
---
|
|
|
|
|
2023-05-01 09:54:42 +00:00
|
|
|
### Questions
|
|
|
|
|
|
|
|
The following section lists individual questions.
|
|
|
|
|
|
|
|
### How do I generate client secrets?
|
2022-10-20 04:27:09 +00:00
|
|
|
|
|
|
|
We strongly recommend the following guidelines for generating client secrets:
|
|
|
|
|
|
|
|
1. Each client should have a unique secret.
|
|
|
|
2. Each secret should be randomly generated.
|
|
|
|
3. Each secret should have a length above 40 characters.
|
|
|
|
4. The secrets should be stored in the configuration in a supported hash format. *__Note:__ This does not mean you
|
|
|
|
configure the relying party / client application with the hashed version, just the secret value in the Authelia
|
|
|
|
configuration.*
|
|
|
|
5. Secrets should only have alphanumeric characters as some implementations do not appropriately encode the secret
|
|
|
|
when using it to access the token endpoint.
|
|
|
|
|
2022-10-23 07:09:19 +00:00
|
|
|
Authelia provides an easy way to perform such actions via the [Generating a Random Password Hash] guide. Users can
|
2023-04-15 12:25:21 +00:00
|
|
|
perform a command such as
|
2023-04-23 00:03:39 +00:00
|
|
|
`authelia crypto hash generate pbkdf2 --variant sha512 --random --random.length 72 --random.charset rfc3986` command to
|
2022-10-20 04:27:09 +00:00
|
|
|
both generate a client secret with 72 characters which is printed and is to be used with the relying party and hash it
|
2023-04-15 12:25:21 +00:00
|
|
|
using PBKDF2 which can be stored in the Authelia configuration. This random command also avoids issues with a relying
|
|
|
|
party / client application encoding the characters correctly as it uses the
|
|
|
|
[RFC3986 Unreserved Characters](https://datatracker.ietf.org/doc/html/rfc3986#section-2.3).
|
2022-10-20 04:27:09 +00:00
|
|
|
|
2022-10-23 07:09:19 +00:00
|
|
|
[Generating a Random Password Hash]: ../../reference/guides/generating-secure-values.md#generating-a-random-password-hash
|
2022-10-20 04:27:09 +00:00
|
|
|
|
2023-05-01 09:54:42 +00:00
|
|
|
#### Plaintext
|
2022-10-20 04:27:09 +00:00
|
|
|
|
2023-02-02 01:30:06 +00:00
|
|
|
Authelia *technically* supports storing the plaintext secret in the configuration. This will likely be completely
|
|
|
|
unavailable in the future as it was a mistake to implement it like this in the first place. While some other OpenID
|
|
|
|
Connect 1.0 providers operate in this way, it's more often than not that they operating in this way in error. The
|
|
|
|
current *technical support* for this is only to prevent massive upheaval to users and give them time to migrate.
|
|
|
|
|
|
|
|
As per [RFC6819 Section 5.1.4.1.3](https://datatracker.ietf.org/doc/html/rfc6819#section-5.1.4.1.3) the secret should
|
|
|
|
only be stored by the authorization server as hashes / digests unless there is a very specific specification or protocol
|
|
|
|
that is implemented by the authorization server which requires access to the secret in the clear to operate properly in
|
|
|
|
which case the secret should be encrypted and not be stored in plaintext. The most likely long term outcome is that the
|
|
|
|
client configurations will be stored in the database with the secret both salted and peppered.
|
|
|
|
|
2023-04-15 21:48:03 +00:00
|
|
|
Authelia currently does not implement any of the specifications or protocols which require secrets being accessible in
|
|
|
|
the clear such as most notably the `client_secret_jwt` grant, we will however likely soon implement `client_secret_jwt`.
|
|
|
|
We are however *__strongly discouraging__* and formally deprecating the use of plaintext client secrets for purposes
|
|
|
|
outside those required by specifications. We instead recommended that users remove this from their configuration
|
|
|
|
entirely and use the [How Do I Generate Client Secrets](#how-do-i-generate-client-secrets) FAQ.
|
2023-02-02 01:30:06 +00:00
|
|
|
|
|
|
|
Plaintext is either denoted by the `$plaintext$` prefix where everything after the prefix is the secret. In addition if
|
|
|
|
the secret does not start with the `$` character it's considered as a plaintext secret for the time being but is
|
|
|
|
deprecated as is the `$plaintext$` prefix.
|
2023-03-06 00:32:06 +00:00
|
|
|
|
2023-05-01 09:54:42 +00:00
|
|
|
### Why isn't my application able to retrieve the token even though I've consented?
|
2023-03-06 00:32:06 +00:00
|
|
|
|
|
|
|
The most common cause for this issue is when the affected application can not make requests to the Token [Endpoint].
|
|
|
|
This becomes obvious when the log level is set to `debug` or `trace` and a presence of requests to the Authorization
|
|
|
|
[Endpoint] without errors but an absence of requests made to the Token [Endpoint].
|
|
|
|
|
|
|
|
These requests can be identified by looking at the `path` field in the logs, or by messages prefixed with
|
|
|
|
`Authorization Request` indicating a request to the Authorization [Endpoint] and `Access Request` indicating a request
|
|
|
|
to the Token [Endpoint].
|
|
|
|
|
|
|
|
All causes should be clearly logged by the client application, and all errors that do not match this scenario are
|
|
|
|
clearly logged by Authelia. It's not possible for us to log requests that never occur however.
|
|
|
|
|
2023-05-01 09:54:42 +00:00
|
|
|
One potential solution to this is detailed in the [Solution: Configure DNS Appropriately](#configure-dns-appropriately)
|
|
|
|
section. This section also details how to identity if you're affected.
|
|
|
|
|
|
|
|
### Why doesn't the discovery endpoint return the correct issuer and endpoint URL's?
|
|
|
|
|
|
|
|
The most common cause for this is if the `X-Forwarded-Proto` and `X-Forwarded-Host` / `Host` headers do not match the
|
|
|
|
fully qualified URL of the provider. This can be because of requesting from the Authelia port directly i.e. without going
|
|
|
|
through your proxy or due to a poorly configured proxy.
|
|
|
|
|
|
|
|
If you've configured Authelia alongside a proxy and are making a request directly to Authelia you need to perform the
|
|
|
|
request via the proxy. If you're avoiding the proxy due to a DNS limitation see
|
|
|
|
[Solution: Configure DNS Appropriately](#configure-dns-appropriately) section.
|
|
|
|
|
|
|
|
## Solutions
|
|
|
|
|
|
|
|
The following section details solutions for multiple of the questions above.
|
|
|
|
|
|
|
|
### Configure DNS Appropriately
|
|
|
|
|
|
|
|
In order to make requests to Authelia an application must be able to resolve it. It's important in all instances to
|
|
|
|
check if the application with the issue can resolve the correct IP address for Authelia between each step of the
|
|
|
|
process, and this check also can be used to clearly identity if this is the most likely underlying cause for an issue
|
|
|
|
you're facing.
|
|
|
|
|
|
|
|
##### Bare-Metal
|
|
|
|
|
|
|
|
1. If you're running an internal DNS server ensure an A record exists for the FQDN of Authelia with the value being the
|
|
|
|
IP of the server responsible for handling requests for Authelia.
|
|
|
|
2. If you're not running an internal DNS server then do check the following:
|
|
|
|
1. Ensure the external DNS server(s) have the same A record as described above.
|
|
|
|
2. Ensure that that your NAT-hairpin is configured correctly.
|
|
|
|
3. If all else fails add a hosts file entry to work around this issue.
|
|
|
|
|
|
|
|
##### Docker
|
|
|
|
|
|
|
|
1. Ensure both the application with the issue shares a network in common with the proxy container.
|
|
|
|
2. Ensure an alias for the FQDN of Authelia is present for the proxy container:
|
|
|
|
- If using `docker compose` see the
|
|
|
|
[network aliases](https://docs.docker.com/compose/compose-file/compose-file-v3/#aliases) documentation
|
|
|
|
reference for more information.
|
|
|
|
- If using `docker run` see the `--network-alias` option of the [docker run](https://docs.docker.com/engine/reference/commandline/run/)
|
|
|
|
reference for more information.
|
|
|
|
|
|
|
|
Examples (assuming your Authelia Root URL is `https://auth.example.com`):
|
|
|
|
|
|
|
|
```yaml
|
|
|
|
version: "3.8"
|
|
|
|
services:
|
|
|
|
application:
|
|
|
|
## Mandatory that the application is on the same network as the proxy.
|
|
|
|
networks:
|
|
|
|
proxy: {}
|
|
|
|
proxy:
|
|
|
|
networks:
|
|
|
|
## Mandatory that the proxy is on the same network as the application, and that it has this alias.
|
|
|
|
proxy:
|
|
|
|
aliases:
|
2023-05-07 06:39:17 +00:00
|
|
|
- 'auth.example.com'
|
2023-05-01 09:54:42 +00:00
|
|
|
authelia:
|
|
|
|
networks:
|
|
|
|
proxy: {}
|
|
|
|
networks:
|
|
|
|
proxy:
|
|
|
|
## An external network can be created manually and shared between multiple compose files. This is NOT mandatory.
|
|
|
|
external: true
|
2023-05-07 06:39:17 +00:00
|
|
|
name: 'proxy-net'
|
2023-05-01 09:54:42 +00:00
|
|
|
```
|
|
|
|
|
|
|
|
```console
|
|
|
|
docker run -d --name proxy --network proxy --network-alias auth.example.com <other proxy arguments>
|
|
|
|
docker run -d --name application --network proxy <other application arguments>
|
|
|
|
```
|
|
|
|
|
2023-03-06 00:32:06 +00:00
|
|
|
[Endpoint]: ./introduction.md#discoverable-endpoints
|