Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

[Improvement-284][auth] Add generalized OIDC authentication with multi-provider support#17119

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Closed

Conversation

dhanushakkari00
Copy link

@dhanushakkari00dhanushakkari00 commentedApr 8, 2025
edited
Loading

GSoC 2025

  • Introduced pluggable OIDC support that integrates with multiple Identity Providers (IdPs) such as Keycloak and Dex for generalized SSO.
  • Implemented GenericOidcAuthenticator to dynamically manage authentication for any OIDC-compliant provider.
  • Added utility classes:
    OidcService: Handles token exchange and user session handling.
    OidcUserInfo: Extracts user info from ID token.
  • Created configuration classes:
    OidcConfiguration
    OidcAuthenticationConfig These allow dynamic provider setup via application.yaml.
  • Modified LoginController.java to:
    Redirect to the appropriate OIDC provider based on request.
    Handle callback, extract user info, create session, and redirect back with session ID.

…ovider configuration- Implemented pluggable OIDC support with Keycloak and Dex compatibility- Added GenericOidcAuthenticator and OidcService for dynamic OIDC login- Introduced config-driven provider support via �pplication.yaml- Extended LoginController to handle OIDC redirects and session creation- Enables scalable authentication using OIDC-compliant providers beyond CasdoorRelated to: GSOC-284
@boring-cyborgboring-cyborg
Copy link

Thanks for opening this pull request! Please check out our contributing guidelines. (https://github.com/apache/dolphinscheduler/blob/dev/docs/docs/en/contribute/join/pull-request.md)

@dhanushakkari00dhanushakkari00 changed the titlefeat(auth): Add generalized OIDC authentication support with multi-pr…[Improvement][Auth] Add generalized OIDC authentication support with multi-provider configurationApr 8, 2025
@dhanushakkari00dhanushakkari00 changed the title[Improvement][Auth] Add generalized OIDC authentication support with multi-provider configuration[Improvement][Auth][GSOC-284] Add generalized OIDC authentication support with multi-provider configurationApr 8, 2025
@dhanushakkari00dhanushakkari00 changed the title[Improvement][Auth][GSOC-284] Add generalized OIDC authentication support with multi-provider configuration[Improvement-GSOC-284][auth] Add generalized OIDC authentication support with multi-provider configurationApr 8, 2025
@dhanushakkari00dhanushakkari00 changed the title[Improvement-GSOC-284][auth] Add generalized OIDC authentication support with multi-provider configuration[Improvement-284][auth] Add generalized OIDC authentication with multi-provider supportApr 8, 2025
@SneakyThrows
@Operation(summary = "redirectToOidc", description = "REDIRECT_TO_OIDC_LOGIN")
@GetMapping("redirect/login/oidc")
public void loginByOidc(@RequestParam String code, @RequestParam String provider,

Check failure

Code scanning / CodeQL

HTTP request type unprotected from CSRF High

Potential CSRF vulnerability due to using an HTTP request type which is not default-protected from CSRF for an apparent
state-changing action
Loading
.
@Operation(summary = "redirectToOidc", description = "REDIRECT_TO_OIDC_LOGIN")
@GetMapping("redirect/login/oidc")
public void loginByOidc(@RequestParam String code, @RequestParam String provider,
HttpServletRequest request, HttpServletResponse response) {

Check notice

Code scanning / CodeQL

Useless parameter Note

The parameter 'request' is never used.
Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment
Reviewers

@caishunfengcaishunfengAwaiting requested review from caishunfengcaishunfeng is a code owner

@SbloodySSbloodySAwaiting requested review from SbloodySSbloodyS is a code owner

Assignees

@dhanushakkari00dhanushakkari00

Labels
Projects
None yet
Milestone
No milestone
Development

Successfully merging this pull request may close these issues.

2 participants
@dhanushakkari00@SbloodyS

[8]ページ先頭

©2009-2025 Movatter.jp