-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
FusionAuth redirects to port 80 when logging in via HTTPS #92
Comments
When FusionAuth logs into itself, we try to build the authorized redirect based on the information in the HTTP request that came in. The code that builds the
Each component is built from the request like this:
If you are using a proxy (and it looks like that is the case), the proxy needs to properly set all of these headers in order for the redirect to work. I'm not familiar with Istio, but you might look into their configuration and see if you need to specify anything special to ensure that the headers are set. |
Thanks for the quick response! - I'll have a look into what headers get set by the Istio gateway. The main reason I am using Istio for this is because it forms part of the containers example here: https://github.com/FusionAuth/fusionauth-containers Chris |
Perhaps there is a better way, but I found this example where the user configured a
|
I had come up with the same solution too! I did try passing through the TLS connection to the FusionAuth container, however setting up certificates and keys got more difficult. |
This gist has an example of using https://gist.github.com/chanjarster/a0529d14466895de1ea69866d69c107c |
@whiskerch were you able to find the correct configuration to add If you have found something that works, I'd like to update the example configuration. You are also welcome to submit a PR to the Thanks! |
I did, This is the config I used in my
and this is the
When I get a chance I'll submit a new PR, with updates and some words on how to create the kubernetes secrets for the tls certs |
Thanks @whiskerch! This is great. @nadilas did you run into similar issues with your K8s config? |
@robotdan I can’t speak to Istio yet, I have it currently deployed on my OpenShift cluster which is using routes for the incoming traffic, no issues so far. I can run a few tests if it helps. |
(Put bug title here)
Incorrect redirection of OAUTH when logging in using SSL
Description
When logging in to the admin using HTTPS via: https://identity.********.io/oauth2/authorize, I enter my details, before being redirected to the 2FA challenge page.
Upon entering a correct challenge code, I am redirected to the following URL: https://identity.**********.io:80/login?code=**********&state=*******-*****************&userState=Authenticated
For some reason, port 80 has been specified at some point in the redirect URL.
When I correct the redirect URL and remove the port number the admin page is displayed
Steps to reproduce
FusionAuth has been deployed into a AWS hosted kubernetes cluster.
The Istio gateway configuration is as follows:
Expected behavior
I expect the redirect url to be:
https://identity.**********.io/login?code=**********&state=*******-*****************&userState=Authenticated
not: https://identity.**********.io:80/login?code=**********&state=*******-*****************&userState=Authenticated
Platform
(Please complete the following information)
The text was updated successfully, but these errors were encountered: