Basic OpenID Provider
Go to file
2022-04-18 17:00:28 +02:00
assets Display account details 2022-04-04 17:39:23 +02:00
src Adapt OpenID discovery route to cluster configuration 2022-04-16 09:06:59 +02:00
templates Fix checkbox selection issue 2022-04-15 22:04:06 +02:00
.gitignore Automatically create admin on first start 2022-03-29 19:32:31 +02:00
build_docker_image.sh Add dockerfile 2022-04-15 22:09:26 +02:00
Cargo.lock Update Rust crate clap to 3.1.9 2022-04-17 15:18:43 +00:00
Cargo.toml Update Rust crate clap to 3.1.9 2022-04-17 15:18:43 +00:00
Dockerfile Add dockerfile 2022-04-15 22:09:26 +02:00
LICENSE Add README & LICENSE 2022-04-18 17:00:28 +02:00
README.md Add README & LICENSE 2022-04-18 17:00:28 +02:00
renovate.json Add renovate.json 2022-04-01 00:10:26 +00:00

Basic OIDC

Basic & lightweight OpenID provider. Supports the authorization_code flow, written in Rust.

WARNING : This tool has not been audited, use it at your own risks!

BasicOIDC operates without any database, just with two files :

  • clients.yaml: a list of authorized relying parties.
  • users.json: a list of users, managed through a web UI.

You can configure a list of clients (Relying Parties) in a clients.yaml file with the following syntax :

- id: gitea
  name: Gitea
  description: Git with a cup of tea
  secret: TOP_SECRET
  redirect_uri: https://mygit.mywebsite.com/

On the first run, BasicOIDC will create a new administrator with credentials admin / admin. On first login you will have to change these default credentials.

In order to run BasicOIDC for development, you will need to create a least an empty clients.yaml file inside the storage directory.

Features :

  • Bruteforce protection
  • 2 factors authentication

Compiling

You will need the Rust toolchain to compile this project. To build it for production, just run:

cargo build --release

Contributing

If you wish to contribute to this software, feel free to send an email to contact@communiquons.org to get an account on my system, managed by BasicOIDC :)