Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

nodebb-plugin-fusionauth-oidc

Package Overview
Dependencies
Maintainers
6
Versions
5
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

nodebb-plugin-fusionauth-oidc

Authenticate to FusionAuth or any OpenID Connect identity provider.

  • 2.0.0
  • latest
  • Source
  • npm
  • Socket score

Version published
Maintainers
6
Created
Source

NodeBB FusionAuth OpenID Connect

This plugin is developed and supported by FusionAuth but it is intended to work with any OpenID Connect identity provider.

If you find any issue or a missing feature, please open an issue.

Features

  • OpenID Connect Authentication
  • Authorization Code Grant
  • Hot reloading of the authentication strategy
  • The configuration with the exception of the Email claim can be loaded without restarting NodeBB.

Developing

  1. Run npm link in this directory
  2. Go to your NodeBB directory and run npm link nodebb-plugin-fusionauth-oidc
  3. Run ./nodebb build
  4. Run ./nodebb dev

Installation

  1. Launch NodeBB
  2. Go to the admin portal
  3. Select Extend > Plugins from the menu
  4. Click Find Plugins from the sub-menu
  5. Search for fusionauth-oidc Search
  6. Click the Install button on the nodebb-plugin-fusionauth-oidc result
  7. Click Installed from the sub-menu
  8. Find the nodebb-plugin-fusionauth-oidc plugin and click Activate
  9. Rebuild and restart NodeBB
  10. Refresh the page to regenerate the menu

Configuring

To configure the OpenID Connect plugin, perform the following steps to navigate to the configuration panel.

  1. Select Plugins > OpenID Connect from the menu
  2. You are now ready to configure the OpenID Connect plugin

You will need your Client Id, Client Secret and the endpoint URLs provided to you by your OpenID Connect identity provider.

If your OpenID Connect identity provider supports discovery, then you only need to enter the Client Id, Client Secret and Discovery base URL. If this is not available to you or discovery is not successful, you may also enter each endpoint manually .

Once you complete this configuration and save the form, you will need to restart NodeBB for the configuration to take effect.

Plugin Settings

FieldDescription
Client IdThe unique Client Id provided to you by your IdP.
Client SecretThe client secret provided to you by your IdP. In some cases this may not be provided to you if the IdP allows for non-confidential clients.
Discovery URLWhen provided, this URL will be used to find the OpenID Connect discovery document. This URL will be appended with .well-known/openid-configuration. If this URL returns a JSON discovery document the remaining endpoints will be automatically resolved when you press the Save button.
Authorization endpointThe fully qualified URL to the Authorization endpoint.
Token endpointThe fully qualified URL to the Token endpoint.
Userinfo endpointThe fully qualified URL to the Userinfo endpoint.
Logout endpointThe fully qualified URL of the OpenID Connect logout endpoint. If configured, the browser will be redirected to this URL when you click logout in NodeBB.
Email claimThe name of the claim found in the response from the Userinfo endpoint that identifies the user's email address. This is generally email and is the default value.
Roles claimIf present, on login we will check this claim for the value "admin" and if present, give the user access to the admin panel. The claim value can either be a string or array of strings. Anything else will be treated as the user having no roles.

This plugin will work with any OpenID Connect identity provider. If you are using FusionAuth, the values needed for this configuration will be found in your Application OAuth configuration. For more information, review the OAuth configuration tab of the Application configuration in the FusionAuth documentation.

If your provider requires a callback url then use https://<domain>/auth/fusionauth-oidc/callback

Additional Configuration

If you want to skip the login page and always use the configured OpenID Connect identity provider for authentication you will need to disable Login Login and Local Registration.

To disable Local Login:
  1. Select Manage > Privileges from the menu
  2. Uncheck the appropriate boxes under the Local Login column in the Group Privileges table Local Login
To disable Local Registration:
  1. Select Settings > User from the menu
  2. Scroll down to the User Registration section and set Registration Type to No Registration
  3. Click the Save icon Local Registration

Once both Local Login and Local Registration have been disabled, the default login page will be skipped and the user will be automatically redirected to the OpenID Connect login page.

Recovery

If you need to login locally you can manually add the following parameter /login?local=1 to your URL and you will be taken to the default login page.

Developer Notes

If you make changes to the plugin you will need to rebuild and reload. You can do this manually or via the UI.

Keywords

FAQs

Package last updated on 09 Jan 2024

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc