![]() This is the final step for supporting multiple OIDC providers concurrently. First of all, we reorganise the config so that you can specify a list of OIDC providers, instead of a single one. Before: oidc_config: enabled: true issuer: "https://oidc_provider" # etc After: oidc_providers: - idp_id: prov1 issuer: "https://oidc_provider" - idp_id: prov2 issuer: "https://another_oidc_provider" The old format is still grandfathered in. With that done, it's then simply a matter of having OidcHandler instantiate a new OidcProvider for each configured provider. |
||
---|---|---|
.. | ||
__init__.py | ||
__main__.py | ||
_base.py | ||
_base.pyi | ||
_util.py | ||
api.py | ||
appservice.py | ||
auth.py | ||
cache.py | ||
captcha.py | ||
cas.py | ||
consent_config.py | ||
database.py | ||
emailconfig.py | ||
federation.py | ||
groups.py | ||
homeserver.py | ||
jwt_config.py | ||
key.py | ||
logger.py | ||
metrics.py | ||
oidc_config.py | ||
password_auth_providers.py | ||
push.py | ||
ratelimiting.py | ||
redis.py | ||
registration.py | ||
repository.py | ||
room.py | ||
room_directory.py | ||
saml2_config.py | ||
server.py | ||
server_notices_config.py | ||
spam_checker.py | ||
sso.py | ||
stats.py | ||
third_party_event_rules.py | ||
tls.py | ||
tracer.py | ||
user_directory.py | ||
voip.py | ||
workers.py |