Skip to content

Commit

Permalink
Merge pull request OCA#300 from OCA/15.0
Browse files Browse the repository at this point in the history
Syncing from upstream OCA/server-auth (15.0)
  • Loading branch information
bt-admin authored Feb 21, 2023
2 parents b83ddac + 012a447 commit 69633c4
Show file tree
Hide file tree
Showing 5 changed files with 46 additions and 44 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ addon | version | maintainers | summary
[auth_api_key_server_env](auth_api_key_server_env/) | 15.0.1.0.0 | | Configure api keys via server env. This can be very useful to avoid mixing your keys between your various environments when restoring databases. All you have to do is to add a new section to your configuration file according to the following convention:
[auth_ldaps](auth_ldaps/) | 15.0.1.0.0 | | Allows to use LDAP over SSL authentication
[auth_oauth_multi_token](auth_oauth_multi_token/) | 15.0.1.0.0 | | Allow multiple connection with the same OAuth account
[auth_oidc](auth_oidc/) | 15.0.1.0.0 | [![sbidoul](https://github.com/sbidoul.png?size=30px)](https://github.com/sbidoul) | Allow users to login through OpenID Connect Provider
[auth_oidc](auth_oidc/) | 15.0.1.0.1 | [![sbidoul](https://github.com/sbidoul.png?size=30px)](https://github.com/sbidoul) | Allow users to login through OpenID Connect Provider
[auth_saml](auth_saml/) | 15.0.1.1.1 | | SAML2 Authentication
[auth_session_timeout](auth_session_timeout/) | 15.0.1.0.0 | | This module disable all inactive sessions since a given delay
[auth_signup_verify_email](auth_signup_verify_email/) | 15.0.1.0.0 | | Force uninvited users to use a good email for signup
Expand Down
28 changes: 14 additions & 14 deletions auth_oidc/README.rst
Original file line number Diff line number Diff line change
Expand Up @@ -52,16 +52,16 @@ Example configuration with OpenID Connect implicit flow.
This configuration is not recommended because it exposes the access token
to the client, and in logs.

# configure a new web application in Azure with OpenID and implicit flow (see
the `provider documentation
<https://docs.microsoft.com/en-us/powerapps/maker/portals/configure/configure-openid-provider)>`_)
# in this application the redirect url must be be "<url of your
server>/auth_oauth/signin" and of course this URL should be reachable from
Azure
# create a new authentication provider in Odoo with the following
parameters (see the `portal documentation
<https://docs.microsoft.com/en-us/powerapps/maker/portals/configure/configure-openid-settings>`_
for more information):
1. configure a new web application in Azure with OpenID and implicit flow (see
the `provider documentation
<https://docs.microsoft.com/en-us/powerapps/maker/portals/configure/configure-openid-provider)>`_)
2. in this application the redirect url must be be "<url of your
server>/auth_oauth/signin" and of course this URL should be reachable from
Azure
3. create a new authentication provider in Odoo with the following
parameters (see the `portal documentation
<https://docs.microsoft.com/en-us/powerapps/maker/portals/configure/configure-openid-settings>`_
for more information):

* Provider Name: Azure
* Auth Flow: OpenID Connect
Expand All @@ -80,10 +80,10 @@ Example configuration with OpenID Connect authorization code flow.

In Keycloak:

# configure a new Client
# make sure Authorization Code Flow is Enabled.
# configure the client Access Type as "confidential" and take note of the client secret in the Credentials tab
# configure the redirect url to be "<url of your server>/auth_oauth/signin"
1. configure a new Client
2. make sure Authorization Code Flow is Enabled.
3. configure the client Access Type as "confidential" and take note of the client secret in the Credentials tab
4. configure the redirect url to be "<url of your server>/auth_oauth/signin"

In Odoo, create a new Oauth Provider with the following parameters:

Expand Down
2 changes: 1 addition & 1 deletion auth_oidc/__manifest__.py
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@

{
"name": "Authentication OpenID Connect",
"version": "15.0.1.0.0",
"version": "15.0.1.0.1",
"license": "AGPL-3",
"author": (
"ICTSTUDIO, André Schenkels, "
Expand Down
28 changes: 14 additions & 14 deletions auth_oidc/readme/CONFIGURE.rst
Original file line number Diff line number Diff line change
Expand Up @@ -5,16 +5,16 @@ Example configuration with OpenID Connect implicit flow.
This configuration is not recommended because it exposes the access token
to the client, and in logs.

# configure a new web application in Azure with OpenID and implicit flow (see
the `provider documentation
<https://docs.microsoft.com/en-us/powerapps/maker/portals/configure/configure-openid-provider)>`_)
# in this application the redirect url must be be "<url of your
server>/auth_oauth/signin" and of course this URL should be reachable from
Azure
# create a new authentication provider in Odoo with the following
parameters (see the `portal documentation
<https://docs.microsoft.com/en-us/powerapps/maker/portals/configure/configure-openid-settings>`_
for more information):
1. configure a new web application in Azure with OpenID and implicit flow (see
the `provider documentation
<https://docs.microsoft.com/en-us/powerapps/maker/portals/configure/configure-openid-provider)>`_)
2. in this application the redirect url must be be "<url of your
server>/auth_oauth/signin" and of course this URL should be reachable from
Azure
3. create a new authentication provider in Odoo with the following
parameters (see the `portal documentation
<https://docs.microsoft.com/en-us/powerapps/maker/portals/configure/configure-openid-settings>`_
for more information):

* Provider Name: Azure
* Auth Flow: OpenID Connect
Expand All @@ -33,10 +33,10 @@ Example configuration with OpenID Connect authorization code flow.

In Keycloak:

# configure a new Client
# make sure Authorization Code Flow is Enabled.
# configure the client Access Type as "confidential" and take note of the client secret in the Credentials tab
# configure the redirect url to be "<url of your server>/auth_oauth/signin"
1. configure a new Client
2. make sure Authorization Code Flow is Enabled.
3. configure the client Access Type as "confidential" and take note of the client secret in the Credentials tab
4. configure the redirect url to be "<url of your server>/auth_oauth/signin"

In Odoo, create a new Oauth Provider with the following parameters:

Expand Down
30 changes: 16 additions & 14 deletions auth_oidc/static/description/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -410,16 +410,16 @@ <h2><a class="toc-backref" href="#id6">Setup for Microsoft Azure</a></h2>
<p>Example configuration with OpenID Connect implicit flow.
This configuration is not recommended because it exposes the access token
to the client, and in logs.</p>
<dl class="docutils">
<dt># configure a new web application in Azure with OpenID and implicit flow (see</dt>
<dd>the <a class="reference external" href="https://docs.microsoft.com/en-us/powerapps/maker/portals/configure/configure-openid-provider)">provider documentation</a>)</dd>
<dt># in this application the redirect url must be be “&lt;url of your</dt>
<dd>server&gt;/auth_oauth/signin” and of course this URL should be reachable from
Azure</dd>
<dt># create a new authentication provider in Odoo with the following</dt>
<dd>parameters (see the <a class="reference external" href="https://docs.microsoft.com/en-us/powerapps/maker/portals/configure/configure-openid-settings">portal documentation</a>
for more information):</dd>
</dl>
<ol class="arabic simple">
<li>configure a new web application in Azure with OpenID and implicit flow (see
the <a class="reference external" href="https://docs.microsoft.com/en-us/powerapps/maker/portals/configure/configure-openid-provider)">provider documentation</a>)</li>
<li>in this application the redirect url must be be “&lt;url of your
server&gt;/auth_oauth/signin” and of course this URL should be reachable from
Azure</li>
<li>create a new authentication provider in Odoo with the following
parameters (see the <a class="reference external" href="https://docs.microsoft.com/en-us/powerapps/maker/portals/configure/configure-openid-settings">portal documentation</a>
for more information):</li>
</ol>
<ul class="simple">
<li>Provider Name: Azure</li>
<li>Auth Flow: OpenID Connect</li>
Expand All @@ -435,10 +435,12 @@ <h2><a class="toc-backref" href="#id6">Setup for Microsoft Azure</a></h2>
<h2><a class="toc-backref" href="#id7">Setup for Keycloak</a></h2>
<p>Example configuration with OpenID Connect authorization code flow.</p>
<p>In Keycloak:</p>
<p># configure a new Client
# make sure Authorization Code Flow is Enabled.
# configure the client Access Type as “confidential” and take note of the client secret in the Credentials tab
# configure the redirect url to be “&lt;url of your server&gt;/auth_oauth/signin”</p>
<ol class="arabic simple">
<li>configure a new Client</li>
<li>make sure Authorization Code Flow is Enabled.</li>
<li>configure the client Access Type as “confidential” and take note of the client secret in the Credentials tab</li>
<li>configure the redirect url to be “&lt;url of your server&gt;/auth_oauth/signin”</li>
</ol>
<p>In Odoo, create a new Oauth Provider with the following parameters:</p>
<ul class="simple">
<li>Provider name: Keycloak (or any name you like that identify your keycloak
Expand Down

0 comments on commit 69633c4

Please sign in to comment.