OAuth Provider Configuration
You will need to register an OAuth application with a Provider (Google, GitHub or another provider), and configure it
with Redirect URI(s) for the domain you intend to run oauth2-proxy
on.
Valid providers are :
- Google default
- Azure
- ADFS
- GitHub
- Gitea
- Keycloak/Keycloak OIDC
- GitLab
- Microsoft Azure AD
- OpenID Connect
- login.gov
- Nextcloud
- DigitalOcean
- Bitbucket
The provider can be selected using the provider
configuration value.
Please note that not all providers support all claims. The preferred_username
claim is currently only supported by the
OpenID Connect provider.
Email Authentication
To authorize a specific email-domain use --email-domain=yourcompany.com
. To authorize individual email addresses use
--authenticated-emails-file=/path/to/file
with one email per line. To authorize all email addresses use --email-domain=*
.
Adding a new Provider
Follow the examples in the providers
package to define a new
Provider
instance. Add a new case
to
providers.New()
to allow oauth2-proxy
to use the
new Provider
.