A distributed memcache setup is required to properly operate this app - like Redis or memcached. For development purpose APCu is reasonable as well. Please follow the documentation on how to set up caching.
The OpenId integration is established by entering the parameters below to the ownCloud configuration file. provider-url, client-id and _client-secret- are to be taken from the OpenId Provider setup. loginButtonName can be chosen freely depending on the installation.
<?php
$CONFIG = [
'openid-connect' => [
'provider-url' => 'https://idp.example.net',
'client-id' => 'fc9b5c78-ec73-47bf-befc-59d4fe780f6f',
'client-secret' => 'e3e5b04a-3c3c-4f4d-b16c-2a6e9fdd3cd1',
'loginButtonName' => 'OpenId Connect'
]
];
The above configuration assumes that the OpenId Provider is supporting service discovery. If not the endpoint configuration has to be done manually as follows:
<?php
$CONFIG = [
'openid-connect' => [
'provider-url' => 'https://idp.example.net',
'client-id' => 'fc9b5c78-ec73-47bf-befc-59d4fe780f6f',
'client-secret' => 'e3e5b04a-3c3c-4f4d-b16c-2a6e9fdd3cd1',
'loginButtonName' => 'OpenId Connect',
'post_logout_redirect_uri' => '...',
'provider-params' => [
'authorization_endpoint' => '...',
'token_endpoint' => '...',
'token_endpoint_auth_methods_supported' => '...',
'userinfo_endpoint' => '...',
'registration_endpoint' => '...',
'end_session_endpoint' => '...',
'jwks_uri' => '...'
]
]
];
The auto provisioning mode will create a user based on the provided user information as returned by the OpenID Connect provider. The config parameters 'mode' and 'search-attribute' will be used to create a unique user so that the lookup mechanism can find the user again.
<?php
$CONFIG = [
'openid-connect' => [
'auto-provision' => [
// explicit enable the auto provisioning mode
'enabled' => true,
// documentation about standard claims: https://openid.net/specs/openid-connect-core-1_0.html#StandardClaims
// only relevant in userid mode, defines the claim which holds the email of the user
'email-claim' => 'email',
// defines the claim which holds the display name of the user
'display-name-claim' => 'given_name',
// defines the claim which holds the picture of the user - must be a URL
'picture-claim' => 'picture',
// defines a list of groups to which the newly created user will be added automatically
'groups' => ['admin', 'guests', 'employees'],
]
]
];
- loginButtonName - the name as displayed on the login screen which is used to redirect to the IdP
- autoRedirectOnLoginPage - if set to true the login page will redirect to the Idp right away
- provider-url - the url where the IdP is living. In some cases (KeyCloak, Azure AD) this holds more than just a domain but also a path
- client-id & client-secret - self-explanatory
- scopes - depending on the IdP setup, needs the list of required scopes to be entered here
- insecure - boolean value (true/false), no ssl verification will take place when talking to the IdP - DON'T use in production
- provider-params - additional config depending on the IdP is to be entered here - usually only necessary if the IdP does not support service discovery
- auth-params - additional parameters which are sent to the IdP during the auth requests
- redirect-url - the full url under which the ownCloud OpenId Connect redirect url is reachable - only needed in special setups
- use-token-introspection-endpoint - if set to true the token introspection endpoint is used to verify a given access token - only needed if the access token is not a JWT
- token-introspection-endpoint-client-id & token-introspection-endpoint-client-secret - client id and secret to be used with the token introspection endpoint
- post_logout_redirect_uri - a given url where the IdP should redirect to after logout
- mode - the mode to search for user in ownCloud - either userid or email
- search-attribute - the attribute which is taken from the access token JWT or user info endpoint to identify the user
- allowed-user-backends - limit the users which are allowed to login to a specific user backend - e.g. LDAP
- use-access-token-payload-for-user-info - if set to true any user information will be read from the access token. If set to false the userinfo endpoint is used (starting app version 1.1.0)
When registering ownCloud as OpenId Client use https://cloud.example.net/index.php/apps/openidconnect/redirect
as redirect url .
In case OpenID Connect Front-Channel Logout 1.0
is supported please enter https://cloud.example.net/index.php/apps/openidconnect/logout
as logout url within the client registration of the OpenId Provider.
We require frontchannel_logout_session_required
to be true.
In order to allow other clients to use OpenID Connect when talking to ownCloud please setup a redirect on the web server to point .well-known/openid-configuration to /index.php/apps/openidconnect/config
This is an .htaccess example
RewriteRule ^\.well-known/openid-configuration /index.php/apps/openidconnect/config [P]
The Apache modules proxy and proxy_http need to be enabled. (Debian/Ubuntu: a2enmod proxy proxy_http)
There are various Open Source IdPs out there. The one with the most features implemented seems to be panva/node-oidc-provider. CAUTION: node-oidc-provider does not accept the redirect URLs we need for owncloud clients. For release testing, use kopano konnectd instead.
To set it up locally do the following:
- Clone panva/node-oidc-provider
- yarn install
- cd example
- Add client config into https://github.com/panva/node-oidc-provider/blob/master/example/support/configuration.js#L14
module.exports.clients = [ { client_id: 'ownCloud', client_secret: 'ownCloud', grant_types: ['refresh_token', 'authorization_code'], redirect_uris: ['http://localhost:8080/index.php/apps/openidconnect/redirect'], frontchannel_logout_uri: 'http://localhost:8080/index.php/apps/openidconnect/logout' } ];
- Start the IdP via:
node standalone.js
- Open in browser: http://localhost:3000/.well-known/openid-configuration
- ownCloud configuration looks as follows:
$CONFIG = [ 'openid-connect' => [ 'provider-url' => 'http://localhost:3000', 'client-id' => 'ownCloud', 'client-secret' => 'ownCloud', 'loginButtonName' => 'node-oidc-provider', 'mode' => 'userid', 'search-attribute' => 'sub', 'use-token-introspection-endpoint' => true, // do not verify tls host or peer 'insecure' => true ], ];
- Clients can now use http://localhost:3000/.well-known/openid-configuration to obtain all information which is necessary to initiate the OpenId Connect flow. Use the granted access token in any request to ownCloud within a bearer authentication header.
- You can login with any credentials but you need to make sure that the user with the given user id exists. In a real world deployment the users will come from LDAP.
Keep in mind that by default, oidc app will search for the
email
attribute - which is hardcoded to[email protected]
ref If you wish to map the login name on the oidc-provider with owncloud user ids, you can configure it as following:
$CONFIG = [
'openid-connect' => [
'search-attribute' => 'sub',
'mode' => 'userid',
]