-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proposal: Add info about SERVER_USEFORWARDHEADERS
to SSO guide
#1017
Comments
Hi, thank you for the feedback (and contribution). We'll reflect the changes in the documentation soon. |
Thanks once again, done. |
Thanks @Haarolean . I hate to be a PITA, but a few days ago I attempted to deploy the latest build of The guidance from that project now is to use |
@clocklear hey, yeah, we've updated boot some time ago. Thanks for this information, I'll update the docs. |
Added information from provectus#1017
Is your proposal related to a problem?
I recently set up kafka-ui with MSK in ECS on AWS with the intent of using SSO with Auth0 to secure the application. I am terminating SSL on the load balancer; connections between the load balancer and the kafka-ui container are HTTP. Following the SSO guide, I set up only the environment variables that were relevant to SSO:
However, what I observed is that the redirect URI that was formed by the application and passed to Auth0 used the HTTP scheme instead of HTTPS, ostensibly because the connection between the LB and the app is non-TLS.
Describe the solution you'd like
After digging through a few articles online (and deducing that Spring Security is being used to facilitate authN/Z), I found that there is a Spring setting that must be enabled in my particular configuration that causes Spring to use the
X-Forwarded-For
headers to determine the originating scheme in order to form the correct redirect URI to pass to Auth0. By settingSERVER_USEFORWARDHEADERS
totrue
, the application now properly handles my SSO authentication with Auth0. I propose that the SSO guide be augmented in such a way to call out the scenario in which SSL is terminated prior to the application (such as on a load balancer), the app may need to be configured to respect theX-Forwarded-For
headers (which is apparently not the default).(tl;dr -- the docs for SSO should suggest setting
SERVER_USEFORWARDHEADERS
totrue
when TLS is terminated by a proxy.)Describe alternatives you've considered
None.
Additional context
More info can be found in this SO answer: https://stackoverflow.com/a/40879393
The text was updated successfully, but these errors were encountered: