New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SAML Authentication flow support #11867
Comments
This might also be interesting when connecting to Nextcloud with SSO & SAML authentication 1. Footnotes
|
Very similarly, OIDC support is so close with keycloak. The client almost works in that it redirects correctly to the OIDC IDP and presents the correct certifcate for mutual TLS, but then since it issues a PROPFIND, keycloak presents an error instead of redirecting it. Going to see if I can get keycloak to accept a PROPFIND request... |
The first request sent should be a |
Yes, it is, and MountainDuck and Cyberduck are the same in this.
Since the WebDAV server is custom, I don't have many requirements over it because I can make it work with whatever the client sends as long as the client supports redirects and cookies (which both Mountain Duck and Cyberduck do). So I really only need a minor configuration change for this flow to work I believe which is something to the effect of a checkbox/boolean for "Send GET requests for 3rd party servers" (e.g., detect that keycloak isn't the originating domain and you were redirected there, do a GET request instead, then follow whatever redirect it gives you) or maybe "Send GET requests for all redirects received" (though maybe WebDAV allows redirects sometimes, like in the case of a symlink?) |
We are using a product called Adobe Experience Manager(AEM) with webdav support, however the system uses SAML authentication.
The text was updated successfully, but these errors were encountered: