-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Azure groups support and Azure OAuth v2.0 #1574
Add Azure groups support and Azure OAuth v2.0 #1574
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Adding yet another URL to the list of URLs that needs to be set requires strong justification IMO. Does Azure not provide a specific profile URL in the V2 version which allows you to fetch the groups and other information? Can you link to documentation that shows you must use a separate call to access group information
@JoelSpeed the To ensure that the token size doesn't exceed HTTP header size limits, Azure AD limits the number of object IDs that it includes in the If a user is member of more groups than the overage limit (200 for JWT tokens), then Azure AD does not emit the |
Yikes! If a user is a member of more that 200 groups, do we really want to be storing that much data in our session anyway? Seems like we will have incredible session bloat |
Unfortunately many users using our apps fronted by an auth proxy were hitting this limitation 😞 . The workaround was to suggest them unsubscribing to some groups until they get to a reasonable number. |
@JoelSpeed @braunsonm I think this PR is ready for a last round of reviews. I've tested it with both V1(https://sts.windows.net/{tenant-id}/) and V2(https://login.microsoftonline.com/{tenant-id}/v2.0) Azure Auth endpoints. The only still non working thing is the Looking forward for your feedback. |
@adriananeci wouldn't #1505 be solved by using the graph token that you're generating here? Not sure if you looked into the issue anymore but seems like it should be fixed or nearly fixed by this change. |
I've already tried it, but it was failing while fetching the
|
Aha! I'm pretty sure this is similar to what I mentioned in our other discussion about the email. I've seen that. Did you add the |
@braunsonm yup, all scopes were added during token acquisition:
I wasn't able to access the userinfo endpoint due to
I've checked the token claims and the Can this be due to https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-on-behalf-of-flow#client-limitations ? |
bb4ee81
to
aa46040
Compare
No, oauth2-proxy doesn't use the implicit flow |
Thank you @adriananeci for your effort! 🚀 |
@adriananeci any update? |
aa46040
to
69e2bf1
Compare
I don't have any updates, I'm looking forward for any feedback from the maintainers or other interested parties. Not sure what or how to proceed further. |
69e2bf1
to
b25926e
Compare
CI is failing most probably because
and
@JoelSpeed mind taking a look at github ci workflow please? I suspect it needs to be updated to go 1.18 to be in sync with |
e16dd74
to
16955e2
Compare
I've updated CI workflow and |
@JoelSpeed @braunsonm kindly reminder |
@JoelSpeed @aiciobanu @Niksko could you please take a look? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overall this seems fine to me, left a comment on one thing
@JoelSpeed @braunsonm and @weinong can you review this PR? |
@adriananeci could you please fix the conflicts? |
could we get it into upstream? This is a very important feature for those using OAuth with AAD |
db18354
to
7530dcb
Compare
@JoelSpeed please help this PR move forward! 🙏🏻 ❤️ 🥺 💝 |
Can we get an update on this? We are waiting to roll out a project that will require this. We need to know if this is coming or if we need to look for another project to replace this one. Any update on an estimated timeline of when this will be merged is more than enough. Thanks for the time you put into this project! |
7530dcb
to
c2c968e
Compare
Thank you @adriananeci for your effort! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is mostly ok but I'd like to see it cleaned up a bit please, see the feedback inline
2. Pick a name, check the supported account type(single-tenant, multi-tenant, etc). In the **Redirect URI** section create a new | ||
**Web** platform entry for each app that you want to protect by the oauth2 proxy(e.g. | ||
https://internal.yourcompanycom/oauth2/callback). Click **Register**. | ||
3. Next we need to add group read permissions for the app registration, on the **API Permissions** page of the app, click on |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this new permission a breaking change?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If you're referring to a breaking change between Azure v1 and v2 I would say yes, but if you're referring strictly to v1 then there shouldn't be a breaking change between the current version and the changes from this PR.
@JoelSpeed thank you a lot for your review! ❤️ |
2c2edc8
to
5d388cc
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for taking a look, left a few more comments, there's still a few places we can improve I think
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please add a changelog entry and I'll get this merged. We should probably include an important note about the changes here and what it means for azure users
Thanks @adriananeci and @JoelSpeed, I am happy to see this effort come to an end! 🚀 |
1a76e55
to
185f3a2
Compare
Updated the changelog with changes and important notes. |
96859bc
to
a5d9188
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for working with me on this @adriananeci and apologies for the delays in getting to this, LGTM
How do I build a new package with tis included to use now until the next release is created? |
I'm having a really hard time using Azure v2. Does anyone have some examples on how to use groups with azure v2 and how to use a query string in NGINX to set allowed_groups with auth_request? |
I was getting the following warning: oauth environment variables (running a container with podman) https://oauth2-proxy.github.io/oauth2-proxy/docs/configuration/overview#environment-variables
Save the above to oauth2_proxy.cfg and when you start the container use NGINX config
To use the oauth2 signout endpoint I added the following location. If you don't you will get a browser error too many redirects. This can either be to the webapp's built in sign out URL or just the home page of the webapp. https://oauth2-proxy.github.io/oauth2-proxy/docs/features/endpoints#sign-out
To add the email or username to the headers in the browser you can add
With the config above we are able to protect more than one site with a single instance of oauth2-proxy. |
Description
This PR adds support for Azure groups and Azure OAuth v2.0 (https://login.microsoftonline.com/{tenant_id}/v2.0)
Resolves #1231
Resolves #1505
Resolves #888
Motivation and Context
This is an extended PR for #1514
How Has This Been Tested?
Tested with Azure environment using both OAuth v1 and v2.0
Validated that it works with and without
allowed-group
configured.Checklist: