mirror of
https://github.com/h44z/wg-portal.git
synced 2026-04-15 12:06:21 +00:00
OIDC - support IdP logout (#670)
* OIDC - support IdP logout Signed-off-by: Michael Tupitsyn <michael.tupitsyn@gmail.com> * Add support of logout_idp_session parameter Signed-off-by: Michael Tupitsyn <michael.tupitsyn@gmail.com> * Fix merge conflict issue Signed-off-by: Michael Tupitsyn <michael.tupitsyn@gmail.com> * Restore original package-lock.json Signed-off-by: Michael Tupitsyn <michael.tupitsyn@gmail.com> * Cleanup --------- Signed-off-by: Michael Tupitsyn <michael.tupitsyn@gmail.com> Co-authored-by: Christoph Haas <christoph.h@sprinternet.at>
This commit is contained in:
@@ -278,6 +278,11 @@ type OpenIDConnectProvider struct {
|
||||
// If LogSensitiveInfo is set to true, sensitive information retrieved from the OIDC provider will be logged in trace level.
|
||||
// This also includes OAuth tokens! Keep this disabled in production!
|
||||
LogSensitiveInfo bool `yaml:"log_sensitive_info"`
|
||||
|
||||
// LogoutIdpSession controls whether the user's session at the OIDC provider is terminated on logout.
|
||||
// If set to true (default), the user will be redirected to the IdP's end_session_endpoint after local logout.
|
||||
// If set to false, only the local wg-portal session is invalidated.
|
||||
LogoutIdpSession *bool `yaml:"logout_idp_session"`
|
||||
}
|
||||
|
||||
// OAuthProvider contains the configuration for the OAuth provider.
|
||||
|
||||
Reference in New Issue
Block a user