Commit Graph

29 Commits (6b3f8876840988595807191a058ac7b0c431d066)

Author SHA1 Message Date
lebaudantoine 6b3f887684 feat: Parametrize OIDC ID token signing algorithm
Planka originally supported only RS256, the default value set by
the openid-client library from Panva.

To provide more flexibility for clients in configuring their OIDC interactions
with various providers, we now allow passing a signature algorithm through
an environment variable.

This enhancement enables users to specify a preferred signature algorithm,
accommodating different OIDC provider requirements.
1 year ago
lebaudantoine 9aaaca1b8d feat: Support OIDC signed UserInfo responses
Some OIDC providers support signed UserInfo response, to enhance
security. The OIDC client should be free to ask for the user info
sgnature, however in certain situations (e.g egov applications)
where security matters, the OIDC providers might chose to enforce
this sugnature.

Planka was not supported signed UserInfo response, which resulted
in an misleading exception 'invalidCodeOrNonce'.

Introduce the proper configurations to parametrize the OIDC client,
and a dedicated exception to improve the developer experience.

Specifications:

"The UserInfo Claims MUST be returned as the members of a JSON
object unless a signed or encrypted response was requested
during Client Registration."
1 year ago
lebaudantoine a6c8f1bc23 ref: Parametrize OIDC authorization response mode
Planka used a default response_mode 'fragment', which is not supported by all
OIDC providers.

Planka supports only the Authorization Code flow. The default response mode
for the authorization code flow is 'query', meaning the authorization server
appends the authorization code to the redirect URI as a query parameter.

I have added two environment variables: one to use the default response mode
from the OIDC provider, and one to customize the response mode if needed.

Using the default response mode is recommended by the OIDC specification:
"This use of this parameter is NOT RECOMMENDED when the Response Mode that
would be requested is the default mode specified for the Response Type."

To avoid any breaking changes, I kept the default value as 'fragment'. Ideally,
the environment variable should be undefined by default.
1 year ago
NathanVss cc1e886a31
feat: Ability to allow everyone to create projects (#787) 2 years ago
Gavin Mogan 5fcea5d651
fix: Handle WEBHOOKS env variable being unset (#785)
Closes #784
2 years ago
Maksim Eltyshev c065566c15 feat: Webhooks configuration, all events support, refactoring 2 years ago
HannesOberreiter 3779bdb053
feat: Events via webhook (#771)
Closes #215, closes #656
2 years ago
Smiley3112 2d6666d693
feat: Add SMTP_NAME environment variable (#761)
Closes #758
2 years ago
Matthieu Bollot 2f3dfe775e
feat: Slack bot notifications (#676) 2 years ago
Edouard 9f0fce098e
feat: SMTP integration and email notifications (#631) 2 years ago
Maksim Eltyshev 6802a0dc69 fix: Fix case sensitivity of default admin environment variables 2 years ago
Maksim Eltyshev b8d262f745 feat: Add ability to enforce SSO
Closes #543, closes #545
2 years ago
Maksim Eltyshev 634d6ceab1 feat: Add ability to map OIDC attributes and ignore username
Closes #554
2 years ago
Maksim Eltyshev 6dc9e4ed99 fix: Disable role change when OIDC roles are not ignored 2 years ago
Balthasar Hofer d4b64b90fc
feat: Add ability to ignore roles when logging in with SSO (#534)
Closes #533
2 years ago
Maksim Eltyshev 40c04c35ff ref: Refactoring 2 years ago
Lorenz Brun 743f2956c8
feat: Improve OIDC SSO (#524)
The OIDC implementation merged in https://github.com/plankanban/planka/pull/491 is flawed for multiple reasons.

It assumes that the access_token returned by the IDP has to be a JWT parseable by the RP which is not the case [1].
Many major IDPs do issue tokens which are not JWTs and RPs should not rely on the contents of these at all.
The only signed token which has a standardized format for direct RP consumption is the OIDC ID token (id_token), but this by default doesn't contain many claims, especially role claims are omitted from them by default for size reasons. To get these additional claims into the ID token, one needs an IDP with support for the "claims" parameter.

It requires manual specification of the JWKS URL which is mandatory in any OIDC discovery document and thus never needs to be manually specified.

It also makes the questionable decision to use a client-side code flow with PKCE where a normal code flow would be much more appropriate as all user data is processed in the backend which can securely hold a client secret (confidential client). This has far wider IDP support, is safer (due to direct involvement of the IDP in obtaining user information) and doesn't require working with ID tokens and claim parameters.

By using a server-side code flow we can also offload most complexity to the server alone, no longer requiring an additional OIDC library on the web client.

Also silent logout doesn't work on most IDPs for security reasons, one needs to actually redirect the user over to the IDP, which then prompts them once more if they actually want to log out.

This implementation should work with any OIDC-compliant IDP and even OAuth 2.0-only IDPs as long as they serve and OIDC discovery document.

[1] rfc-editor.org/rfc/rfc6749#section-5.1
2 years ago
Maksim Eltyshev 8e0c60f5be fix: OIDC finalization and refactoring 2 years ago
Maksim Eltyshev 875895b331 fix: Fix starting without OIDC environment variables
Closes #503
2 years ago
Maksim Eltyshev 91bc889fed feat: Use environment variables for default admin configuration 2 years ago
gorrilla10101 107cb85ba2
feat: OIDC with PKCE flow (#491) 2 years ago
Maksim Eltyshev d38e555293 fix: Provide default value for token expiration 3 years ago
SimonTagne 7786533a90
feat: Improve security of access tokens (#279)
Closes #275
3 years ago
Maksim Eltyshev 36e4bef21b feat: Remove attachments from public access
Closes #219
4 years ago
Maksim Eltyshev 2f7a244807 Add project backgrounds 6 years ago
Maksim Eltyshev f743f4ea8b Add file attachments 6 years ago
Maksim Eltyshev a11f6260c0 Code formatting with prettier, change eslint config for the server 6 years ago
Maksim Eltyshev d24c9a7968 Docker, update readme, update dependencies 6 years ago
Maksim Eltyshev 5ffef61fe7 Initial commit 6 years ago