You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This plugin uses the email address as a primary identifier, which leads to multiple issues (e.g. #126). The writers of the OpenID Connect (OIDC) spec also figured that this was a bad idea and therefore explicitly prohibited that:
I understand that this plugin is an implementation of OAuth, and not OIDC specifically. However, a growing number of OAuth IPs follow the OIDC spec, so I think this is relevant nonetheless.
I am not 100% sure what this means in practice though. I am pretty sure that it should be possible to change the email address at the IP and still log in to the same account. However, what should happen if I have an existing non-SSO account and log in using SSO for the first time? I think it would be reasonable to match on the email address in that case.
I think we need a separate table that maps SSO identities to local accounts. I am not sure how that would fit into the existing architecture though.
The text was updated successfully, but these errors were encountered:
xi
changed the title
email address is used primary identifier, which is forbidden by OIDC
email address is used as primary identifier, which is forbidden by OIDC
Jan 4, 2025
You're right. A "proper" implementation would require some kind of account <-> IdP mapping with users manually creating these association. The current implementation is simple and reuses what DokuWiki already has and is good enough for most use cases.
If you want to tackle changing the architecture, please provide a pull request. Please be sure to address how to move existing oauth accounts to the new mechanism.
This plugin uses the email address as a primary identifier, which leads to multiple issues (e.g. #126). The writers of the OpenID Connect (OIDC) spec also figured that this was a bad idea and therefore explicitly prohibited that:
I understand that this plugin is an implementation of OAuth, and not OIDC specifically. However, a growing number of OAuth IPs follow the OIDC spec, so I think this is relevant nonetheless.
I am not 100% sure what this means in practice though. I am pretty sure that it should be possible to change the email address at the IP and still log in to the same account. However, what should happen if I have an existing non-SSO account and log in using SSO for the first time? I think it would be reasonable to match on the email address in that case.
I think we need a separate table that maps SSO identities to local accounts. I am not sure how that would fit into the existing architecture though.
The text was updated successfully, but these errors were encountered: