You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,6 +20,7 @@
20
20
-[#2282](https://github.com/oauth2-proxy/oauth2-proxy/pull/2282) Fixed checking Google Groups membership using Google Application Credentials (@kvanzuijlen)
21
21
-[#2183](https://github.com/oauth2-proxy/oauth2-proxy/pull/2183) Allowing relative redirect url though an option (@axel7083)
22
22
-[#1866](https://github.com/oauth2-proxy/oauth2-proxy/pull/1866) Add support for unix socker as upstream (@babs)
23
+
-[#1876](https://github.com/oauth2-proxy/oauth2-proxy/pull/1876) Add `--backend-logout-url` with `{id_token}` placeholder (@babs)
23
24
-[#1949](https://github.com/oauth2-proxy/oauth2-proxy/pull/1949) Allow cookie names with dots in redis sessions (@miguelborges99)
24
25
-[#2297](https://github.com/oauth2-proxy/oauth2-proxy/pull/2297) Add nightly build and push (@tuunit)
25
26
-[#2329](https://github.com/oauth2-proxy/oauth2-proxy/pull/2329) Add an option to skip request to profile URL for resolving missing claims in id_token (@nilsgstrabo)
Copy file name to clipboardExpand all lines: docs/docs/configuration/alpha_config.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -440,6 +440,7 @@ Provider holds all configuration for a single provider
440
440
| `scope` | _string_ | Scope is the OAuth scope specification |
441
441
| `allowedGroups` | _[]string_ | AllowedGroups is a list of restrict logins to members of this group |
442
442
| `code_challenge_method` | _string_ | The code challenge method |
443
+
| `backendLogoutURL` | _string_ | URL to call to perform backend logout, `{id_token}` would be replaced by the actual `id_token` if available in the session |
Copy file name to clipboardExpand all lines: docs/docs/configuration/overview.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,6 +74,7 @@ An example [oauth2-proxy.cfg](https://github.com/oauth2-proxy/oauth2-proxy/blob/
74
74
|`--auth-logging-format`| string | Template for authentication log lines | see [Logging Configuration](#logging-configuration)|
75
75
|`--authenticated-emails-file`| string | authenticate against emails via file (one per line) ||
76
76
|`--azure-tenant`| string | go to a tenant-specific or common (tenant-independent) endpoint. |`"common"`|
77
+
|`--backend-logout-url`| string | URL to perform backend logout, if you use `{id_token}` in the url it will be replaced by the actual `id_token` of the user session ||
77
78
|`--basic-auth-password`| string | the password to set when passing the HTTP Basic Auth header ||
78
79
|`--client-id`| string | the OAuth Client ID, e.g. `"123456.apps.googleusercontent.com"`||
79
80
|`--client-secret`| string | the OAuth Client Secret ||
@@ -85,7 +86,7 @@ An example [oauth2-proxy.cfg](https://github.com/oauth2-proxy/oauth2-proxy/blob/
85
86
|`--cookie-httponly`| bool | set HttpOnly cookie flag | true |
86
87
|`--cookie-name`| string | the name of the cookie that the oauth_proxy creates. Should be changed to use a [cookie prefix](https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies#cookie_prefixes) (`__Host-` or `__Secure-`) if `--cookie-secure` is set. |`"_oauth2_proxy"`|
87
88
|`--cookie-path`| string | an optional cookie path to force cookies to (e.g. `/poc/`) |`"/"`|
88
-
|`--cookie-refresh`| duration | refresh the cookie after this duration; `0` to disable; not supported by all providers \[[1](#footnote1)\]||
89
+
|`--cookie-refresh`| duration | refresh the cookie after this duration; `0` to disable; not supported by all providers [^1]||
89
90
|`--cookie-secret`| string | the seed string for secure cookies (optionally base64 encoded) ||
|`--request-logging-format`| string | Template for request log lines | see [Logging Configuration](#logging-configuration)|
177
178
|`--resource`| string | The resource that is protected (Azure AD only) ||
178
-
|`--reverse-proxy`| bool | are we running behind a reverse proxy, controls whether headers like X-Real-IP are accepted and allows X-Forwarded-{Proto,Host,Uri} headers to be used on redirect selection | false |
179
+
|`--reverse-proxy`| bool | are we running behind a reverse proxy, controls whether headers like X-Real-IP are accepted and allows X-Forwarded-\{Proto,Host,Uri\} headers to be used on redirect selection | false |
179
180
|`--scope`| string | OAuth scope specification ||
180
181
|`--session-cookie-minimal`| bool | strip OAuth tokens from cookie session stores if they aren't needed (cookie session store only) | false |
181
182
|`--session-store-type`| string |[Session data storage backend](sessions.md); redis or cookie | cookie |
@@ -206,12 +207,12 @@ An example [oauth2-proxy.cfg](https://github.com/oauth2-proxy/oauth2-proxy/blob/
206
207
|`--allowed-role`| string \| list | restrict logins to users with this role (may be given multiple times). Only works with the keycloak-oidc provider. ||
|`--whitelist-domain`| string \| list | allowed domains for redirection after authentication. Prefix domain with a `.` or a `*.` to allow subdomains (e.g. `.example.com`, `*.example.com`) \[[2](#footnote2)\]||
210
+
|`--whitelist-domain`| string \| list | allowed domains for redirection after authentication. Prefix domain with a `.` or a `*.` to allow subdomains (e.g. `.example.com`, `*.example.com`) [^2]||
210
211
|`--trusted-ip`| string \| list | list of IPs or CIDR ranges to allow to bypass authentication (may be given multiple times). When combined with `--reverse-proxy` and optionally `--real-client-ip-header` this will evaluate the trust of the IP stored in an HTTP header by a reverse proxy rather than the layer-3/4 remote address. WARNING: trusting IPs has inherent security flaws, especially when obtaining the IP address from an HTTP header (reverse-proxy mode). Use this option only if you understand the risks and how to manage them. ||
211
212
|`--encode-state`| bool | encode the state parameter as UrlEncodedBase64 | false |
212
213
213
-
> ###### 1. Only these providers support `--cookie-refresh`: GitLab, Google and OIDC {#footnote1}
214
-
> ###### 2. When using the `whitelist-domain` option, any domain prefixed with a `.` or a `*.` will allow any subdomain of the specified domain as a valid redirect URL. By default, only empty ports are allowed. This translates to allowing the default port of the URLs protocol (80 for HTTP, 443 for HTTPS, etc.) since browsers omit them. To allow only a specific port, add it to the whitelisted domain: `example.com:8080`. To allow any port, use `*`: `example.com:*`. {#footnote2}
214
+
[^1]: Only these providers support `--cookie-refresh`: GitLab, Google and OIDC
215
+
[^2]: When using the `whitelist-domain` option, any domain prefixed with a `.` or a `*.` will allow any subdomain of the specified domain as a valid redirect URL. By default, only empty ports are allowed. This translates to allowing the default port of the URLs protocol (80 for HTTP, 443 for HTTPS, etc.) since browsers omit them. To allow only a specific port, add it to the whitelisted domain: `example.com:8080`. To allow any port, use `*`: `example.com:*`.
0 commit comments