it should be
it should be
how can add 2 or more discovery documents. i already added for google and now i need to add for yahoo.
this worked for me
Hello, I managed to make the plugin work with my SSO openID but it doesn’t come filled in the username field of the other system or email among other fields…
I imagine that I should configure something in the “openid connect claims” field, but I don’t know how to configure this field directly. Can someone give me an example? Here are some prints of how my project is:
I tried it still facing an issue, could you also share what kind of configuration is to be used on the Okta side also.
Hi, does auto provision of user accounts work with the official OIDC plugin?
I am on the business trial and I want to hook up our Fusion Auth instance using OIDC.
I have the settings here - Discourse OpenID Connect - #200 by tobiaseigen
except for enable_local_logins = true.
However, when I try to login from our SSO to Discourse trial with a fresh SSO account I get
Sorry, access to this forum is by invite only.
If I create the account beforehand in Discourse, then click through it all works.
Is there something I am missing to allow for provisioning where users click over? Or is this even possible?
Can you check if the
invite only admin setting is selected? That may be preventing accounts from being created.
Yep, that was it after much clicking around. Can you update your post for that part?
Now, I am trying to figure out how to get rid of the sign up/login in the middle if the user is not setup on discourse yet.
Great! I would not rely on that reply. The first post which should have definitive instructions. If those are not clear enough/up to date we will have to work on that!
Glad you got it working.
Is there a way to avoid “losing” the original route when logging in to a private post?
If we visit a private page and hit either of the login buttons on that page, when redirected back to the site, we end up on the categories page.
Hi, using OpenID connect plugin I am able to authenticate user where IdP is Keycloak. I want to map groups or roles (realm or client) associated with user in Keycloak to discourse.
Is it possible with OpenID connect plugin or is it possible with DiscourseConnect?
I am little confused between OpenID connect plugin and discourse connect. Please help.
How can I configure the OIDC to set the Username as the email account name or a username like value returned from my auth providers. In below screenshot, the Username user2091 looks like generated from a pattern, which isn’t what I want (It’s not editable neither probably caused by some settings I did). How can I make it as “abc” if the email return as “firstname.lastname@example.org”?
In my discourse OIDC config, I only set
openid email profile besides the minimal config required like example. Should I set something else,
openid connect claims for something?
The Discourse OIDC plugin will use the ‘nickname’ claim provided by the identity provider. So you’ll need to review the documentation for your identity provider and work out how to make it send the ‘nickname’ value that you’d like.
Thanks @david. That’s my providers not return the value. Able to display the username from the providers now.