diff --git a/docs/configuration/identity-providers/oidc.md b/docs/configuration/identity-providers/oidc.md index 4229c2cea..21433739d 100644 --- a/docs/configuration/identity-providers/oidc.md +++ b/docs/configuration/identity-providers/oidc.md @@ -90,7 +90,14 @@ for which stage will have each feature, and may evolve over time: Audit Storage - beta4 1 + beta4 1 + Prompt Handling + + + Display Handling + + + beta5 1 Back-Channel Logout diff --git a/internal/handlers/response.go b/internal/handlers/response.go index 1f3f5220e..60674de0b 100644 --- a/internal/handlers/response.go +++ b/internal/handlers/response.go @@ -17,7 +17,7 @@ func handleOIDCWorkflowResponse(ctx *middlewares.AutheliaCtx) { userSession := ctx.GetSession() if !authorization.IsAuthLevelSufficient(userSession.AuthenticationLevel, userSession.OIDCWorkflowSession.RequiredAuthorizationLevel) { - ctx.Logger.Warn("OpenID Connect requires 2FA, cannot be redirected yet") + ctx.Logger.Warnf("OpenID Connect client '%s' requires 2FA, cannot be redirected yet", userSession.OIDCWorkflowSession.ClientID) ctx.ReplyOK() return @@ -36,13 +36,13 @@ func handleOIDCWorkflowResponse(ctx *middlewares.AutheliaCtx) { userSession.OIDCWorkflowSession, userSession.OIDCWorkflowSession.RequestedScopes, userSession.OIDCWorkflowSession.RequestedAudience) { - err := ctx.SetJSONBody(redirectResponse{Redirect: fmt.Sprintf("%s/consent", uri)}) + err = ctx.SetJSONBody(redirectResponse{Redirect: fmt.Sprintf("%s/consent", uri)}) if err != nil { ctx.Logger.Errorf("Unable to set default redirection URL in body: %s", err) } } else { - err := ctx.SetJSONBody(redirectResponse{Redirect: userSession.OIDCWorkflowSession.AuthURI}) + err = ctx.SetJSONBody(redirectResponse{Redirect: userSession.OIDCWorkflowSession.AuthURI}) if err != nil { ctx.Logger.Errorf("Unable to set default redirection URL in body: %s", err) }