-
-
Notifications
You must be signed in to change notification settings - Fork 574
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support OIDC #156
Comments
I'm interesting in this. if you have no time or energy to support this, maybe i do this job. @jmattheis |
Hmm, maybe this is only a documentation issue. Screego doesn't necessary need users, because you can disable the login: Lines 66 to 71 in c652513
When setting the value of the auth mode to |
How would someone set up authenticated TURN and Prometheus Metrics when the auth mode is set to |
What do you mean with authenticated turn? Prometheus is unaffected by the SCREEGO_AUTH_MODE setting, you'd have to create a user like you'd do with SCREEGO_AUTH_MODE=turn. |
Referencing the example config: "turn: User login is required for TURN connections", but if you set up a proxy to handle OIDC authentication, how would those users authenticate to the built-in TURN server? (I'm expecting that you wouldn't suggest proxying TURN through the proxy.) Looking into it, maybe the recommendation in that situation would be to use an external TURN server with a shared secret. |
It basically just works out of the box and should be secure. The TURN credentials are separate from the user credentials and will be generated on demand for new connections, even if SCREEGO_AUTH_MODE=none is used. Screego will transfer these generated credentials to authenticated users via http/WebSocket. So only users that can access the http site can obtain turn credentials and SCREEGO_AUTH_MODE determines whether an additional user login is required. So users that aren't allowed to access the http site, cannot get valid credentials to use the builtin turn server. |
Ah, that wasn't immediately clear to me. Thanks! So, to restate this thread, as an alternative to natively supporting OIDC within screego, folks can do the following:
All that remains then is documenting this as an example. There are too many reverse proxies and deployment options, so perhaps a |
@nogweii Yes, thanks for summarizing. Point 5 is optional and only needed if you have prometheus metrics enabled. |
Hello,
I think OICD for login would be a good extension for your tool. In many environments a service like Authentik (https://goauthentik.io) is used as OIDC provider. This would allow the tool to connect well with SSO.
The text was updated successfully, but these errors were encountered: