@@ -7,7 +7,7 @@ Authentication OpenID Connect
7
7
!! This file is generated by oca-gen-addon-readme !!
8
8
!! changes will be overwritten. !!
9
9
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
10
- !! source digest: sha256:e65c1c978ca0266a8e54f8121675cbf710359cf407413e35518f670be9c9753f
10
+ !! source digest: sha256:cd754fc72d2039d02ab1b8aec98af43fb9543c9a70f2150ab6e482954e4e83d6
11
11
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
12
12
13
13
.. |badge1 | image :: https://img.shields.io/badge/maturity-Beta-yellow.png
@@ -75,18 +75,18 @@ Single tenant provider limits the access to user of your tenant, while
75
75
Multitenants allow access for all AzureAD users, so user of foreign
76
76
companies can use their AzureAD login without an guest account.
77
77
78
- - Provider Name: Azure AD Single Tenant
79
- - Client ID: Application (client) id
80
- - Client Secret: Client secret
81
- - Allowed: yes
78
+ - Provider Name: Azure AD Single Tenant
79
+ - Client ID: Application (client) id
80
+ - Client Secret: Client secret
81
+ - Allowed: yes
82
82
83
83
or
84
84
85
- - Provider Name: Azure AD Multitenant
86
- - Client ID: Application (client) id
87
- - Client Secret: Client secret
88
- - Allowed: yes
89
- - replace {tenant_id} in urls with your Azure tenant id
85
+ - Provider Name: Azure AD Multitenant
86
+ - Client ID: Application (client) id
87
+ - Client Secret: Client secret
88
+ - Allowed: yes
89
+ - replace {tenant_id} in urls with your Azure tenant id
90
90
91
91
|image2 |
92
92
@@ -106,22 +106,22 @@ In Keycloak:
106
106
107
107
In Odoo, create a new Oauth Provider with the following parameters:
108
108
109
- - Provider name: Keycloak (or any name you like that identify your
110
- keycloak provider)
111
- - Auth Flow: OpenID Connect (authorization code flow)
112
- - Client ID: the same Client ID you entered when configuring the client
113
- in Keycloak
114
- - Client Secret: found in keycloak on the client Credentials tab
115
- - Allowed: yes
116
- - Body: the link text to appear on the login page, such as Login with
117
- Keycloak
118
- - Scope: openid email
119
- - Authentication URL: The "authorization_endpoint" URL found in the
120
- OpenID Endpoint Configuration of your Keycloak realm
121
- - Token URL: The "token_endpoint" URL found in the OpenID Endpoint
122
- Configuration of your Keycloak realm
123
- - JWKS URL: The "jwks_uri" URL found in the OpenID Endpoint
124
- Configuration of your Keycloak realm
109
+ - Provider name: Keycloak (or any name you like that identify your
110
+ keycloak provider)
111
+ - Auth Flow: OpenID Connect (authorization code flow)
112
+ - Client ID: the same Client ID you entered when configuring the client
113
+ in Keycloak
114
+ - Client Secret: found in keycloak on the client Credentials tab
115
+ - Allowed: yes
116
+ - Body: the link text to appear on the login page, such as Login with
117
+ Keycloak
118
+ - Scope: openid email
119
+ - Authentication URL: The "authorization_endpoint" URL found in the
120
+ OpenID Endpoint Configuration of your Keycloak realm
121
+ - Token URL: The "token_endpoint" URL found in the OpenID Endpoint
122
+ Configuration of your Keycloak realm
123
+ - JWKS URL: The "jwks_uri" URL found in the OpenID Endpoint
124
+ Configuration of your Keycloak realm
125
125
126
126
.. |image | image :: https://raw.githubusercontent.com/OCA/server-auth/18.0/auth_oidc/static/description/oauth-microsoft_azure-api_permissions.png
127
127
.. |image1 | image :: https://raw.githubusercontent.com/OCA/server-auth/18.0/auth_oidc/static/description/oauth-microsoft_azure-optional_claims.png
@@ -135,63 +135,63 @@ On the login page, click on the authentication provider you configured.
135
135
Known issues / Roadmap
136
136
======================
137
137
138
- - When going to the login screen, check for a existing token and do a
139
- direct login without the clicking on the SSO link
140
- - When doing a logout an extra option to also logout at the SSO
141
- provider.
138
+ - When going to the login screen, check for a existing token and do a
139
+ direct login without the clicking on the SSO link
140
+ - When doing a logout an extra option to also logout at the SSO
141
+ provider.
142
142
143
143
Changelog
144
144
=========
145
145
146
146
18.0.1.0.0 2024-10-09
147
147
---------------------
148
148
149
- - Odoo 18 migration
149
+ - Odoo 18 migration
150
150
151
151
17.0.1.0.0 2024-03-20
152
152
---------------------
153
153
154
- - Odoo 17 migration
154
+ - Odoo 17 migration
155
155
156
156
16.0.1.1.0 2024-02-28
157
157
---------------------
158
158
159
- - Forward port OpenID Connect fixes from 15.0 to 16.0
159
+ - Forward port OpenID Connect fixes from 15.0 to 16.0
160
160
161
161
16.0.1.0.2 2023-11-16
162
162
---------------------
163
163
164
- - Readme link updates
164
+ - Readme link updates
165
165
166
166
16.0.1.0.1 2023-10-09
167
167
---------------------
168
168
169
- - Add AzureAD code flow provider
169
+ - Add AzureAD code flow provider
170
170
171
171
16.0.1.0.0 2023-01-27
172
172
---------------------
173
173
174
- - Odoo 16 migration
174
+ - Odoo 16 migration
175
175
176
176
15.0.1.0.0 2023-01-06
177
177
---------------------
178
178
179
- - Odoo 15 migration
179
+ - Odoo 15 migration
180
180
181
181
14.0.1.0.0 2021-12-10
182
182
---------------------
183
183
184
- - Odoo 14 migration
184
+ - Odoo 14 migration
185
185
186
186
13.0.1.0.0 2020-04-10
187
187
---------------------
188
188
189
- - Odoo 13 migration, add authorization code flow.
189
+ - Odoo 13 migration, add authorization code flow.
190
190
191
191
10.0.1.0.0 2018-10-05
192
192
---------------------
193
193
194
- - Initial implementation
194
+ - Initial implementation
195
195
196
196
Bug Tracker
197
197
===========
@@ -216,10 +216,10 @@ Authors
216
216
Contributors
217
217
------------
218
218
219
- - Alexandre Fayolle <
[email protected] >
220
- - Stéphane Bidoul <
[email protected] >
221
-
222
- - Andreas Perhab <
[email protected] >
219
+ -
Alexandre Fayolle <
[email protected] >
220
+ -
Stéphane Bidoul <
[email protected] >
221
+
222
+ -
Andreas Perhab <
[email protected] >
223
223
224
224
Maintainers
225
225
-----------
0 commit comments