!coeAONBrWyDJnYMbMi:nixos.org

NixOS System Operations

658 Members
About system administration for running NixOS systems in production. Declaratively manage your operations. | Room recommendations: #networking:nixos.org183 Servers

Load older messages


SenderMessageTime
9 Mar 2024
@raitobezarius:matrix.orgraitobezariusAn interesting example of missing requirement in OIDC is the session management problem01:48:49
@hexa:lossy.networkhexaFor me personally federation is not a strong use case01:48:54
@hexa:lossy.networkhexanot even for my workplace01:49:12
@raitobezarius:matrix.orgraitobezariusSure, but, well, that's a completely valid usecase and there's others01:49:36
@hexa:lossy.networkhexathe only reasonable deployment I've seen is for universities01:50:06
@raitobezarius:matrix.orgraitobezariusWell, governments or so-called dataspaces need this sort of stuff too01:50:21
@hexa:lossy.networkhexamakes sense01:50:28
@raitobezarius:matrix.orgraitobezariusEven in the same organization, when there's multiple authorities with separated infrastructure, federation makes a bunch of political stuff easier01:50:53
@raitobezarius:matrix.orgraitobezariusBecause you don't get to enforce / assert LDAP ownership01:51:04
@raitobezarius:matrix.orgraitobezariusFirst party native application login via OIDC is being removed in https://oauth.net/2.1/01:51:34
@raitobezarius:matrix.orgraitobezariusWhich means that you always have to pop up that web page when logging in via OIDC in any native app01:51:49
@raitobezarius:matrix.orgraitobezarius How to log out users in OIDC is very interesting (again a consequence of authorization protocol being used for auth) 01:52:25
@raitobezarius:matrix.orgraitobezariusso there's this spec https://openid.net/specs/openid-connect-frontchannel-1_0.html01:52:29
@raitobezarius:matrix.orgraitobezariuswhich almost no one implement01:52:32
@raitobezarius:matrix.orgraitobezariuswhich means that for example if you login to circleci via github, log out from github, you are still logged in in circleci01:52:44
@raitobezarius:matrix.orgraitobezariusAuth0 who handles a lot of stuff for you has very fun documentation on it: https://auth0.com/docs/manage-users/sessions/session-layers#session-logout01:53:05
@raitobezarius:matrix.orgraitobezariusThey have always 3 sessions to manage this sort of stuff01:53:15
@hexa:lossy.networkhexayeah, that is a can of worms, agreed01:53:25
@hexa:lossy.networkhexabut does that really justify the added complexity for saml?01:53:42
@hexa:lossy.networkhexalike why would you even say you prefer it?01:53:51
@hexa:lossy.networkhexayour neither a government, nor a university, nor a global conglomerate01:54:06
@raitobezarius:matrix.orgraitobezarius(well I worked for :P)01:54:23
@raitobezarius:matrix.orgraitobezariusAnd honestly every time I tried to replicate certain setups with OIDC, it made me appreciate the thoughtfulness of the SAML design01:54:43
@hexa:lossy.networkhexapretty sure people go for saml for poltiical or structural reasons only01:54:52
@raitobezarius:matrix.orgraitobezariusNow, my position is more I wish there were Kanidm for SAML01:54:54
@raitobezarius:matrix.orgraitobezariusAnd I'd probably use more SAML in my infrastructure if I could do that01:55:06
@hexa:lossy.networkhexakeycloak? 😛01:55:16
@raitobezarius:matrix.orgraitobezariusKeycloak does not know how to implement SAML01:55:22
@hexa:lossy.networkhexawho does though? 😄 01:55:36
@raitobezarius:matrix.orgraitobezariusdon't tell me 'see?' :D01:55:37

Show newer messages


Back to Room ListRoom Version: 10