3.7 KiB
title | description | lead | date | draft | images | menu | weight | toc | community | ||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Misago | Integrating Misago with the Authelia OpenID Connect Provider. | 2023-03-04T13:20:00+00:00 | false |
|
620 | true | true |
Tested Versions
Before You Begin
{{% oidc-common %}}
Assumptions
This example makes the following assumptions:
- Application Root URL:
https://misago.example.com
- Authelia Root URL:
https://auth.example.com
- Client ID:
misago
- Client Secret:
insecure_secret
Configuration
Application
To configure Misago to utilize Authelia as an OpenID Connect 1.0 Provider:
- Sign in to the Misago Admin Panel
- Visit
Settings
and clickOAuth 2
- Configure the Following:
- Basic settings:
- Provider name:
authelia
- Client ID:
misago
- Client Secret:
insecure_secret
- Provider name:
- Initializing Login:
- Login form URL:
https://auth.example.com/api/oidc/authorization
- Scopes:
openid profile email
- Login form URL:
- Retrieving access token:
- Access token retrieval URL:
https://auth.example.com/api/oidc/token
- Request method:
POST
- JSON path to access token:
access_token
- Access token retrieval URL:
- Retrieving user data:
- User data URL:
https://auth.example.com/api/oidc/userinfo
- Request method:
GET
- Access token location:
Query string
- Access token name:
access_token
- User data URL:
- User JSON mappings:
- User ID path:
sub
- User name path:
name
- User e-mail path:
email
- User ID path:
- Basic settings:
- Save the configuration
{{< figure src="misago-step-2.png" alt="Settings" width="736" style="padding-right: 10px" >}}
{{< figure src="misago-step-3-1.png" alt="Basic Settings" width="736" style="padding-right: 10px" >}}
{{< figure src="misago-step-3-2.png" alt="Initializing Login" width="736" style="padding-right: 10px" >}}
{{< figure src="misago-step-3-3.png" alt="Retrieving access token" width="736" style="padding-right: 10px" >}}
{{< figure src="misago-step-3-4.png" alt="Retrieving user data" width="736" style="padding-right: 10px" >}}
{{< figure src="misago-step-3-5.png" alt="User JSON mappings" width="736" style="padding-right: 10px" >}}
Authelia
The following YAML configuration is an example Authelia client configuration for use with Misago which will operate with the above example:
identity_providers:
oidc:
## The other portions of the mandatory OpenID Connect 1.0 configuration go here.
## See: https://www.authelia.com/c/oidc
clients:
- id: misago
secret: '$pbkdf2-sha512$310000$c8p78n7pUMln0jzvd4aK4Q$JNRBzwAo0ek5qKn50cFzzvE9RXV88h1wJn5KGiHrD0YKtZaR/nCb2CJPOsKaPK0hjf.9yHxzQGZziziccp6Yng' # The digest of 'insecure_secret'.
public: false
authorization_policy: two_factor
scopes:
- openid
- profile
- email
redirect_uris:
- https://misago.example.com/oauth2/complete/
grant_types:
- authorization_code
response_types:
- code
response_modes:
- query
userinfo_signing_algorithm: none