oidc
Here are 650 public repositories matching this topic...
Describe the bug
Our favicon is missing when opening the welcome page on chrome / macos (see additional details)
Version
<=latest
Expected behavior
Favicon is shown
Actual behavior
Favicon is missing on the welcome page. It shows up when opening other pages like login / admin ui, though.
How to Reproduce?
e.g.
kc.sh start-dev -> navigate to localhost:8080 -> see
In vercel/next.js#34316 (comment) I concluded that getInitialProps really does not play well with our auth model. There are simply much better solutions for this now.
We should discourage the usage of it entirely.
https://next-auth.js.org/tutorials/securing-pages-and-api-routes should be updated to also mention [Middleware support](https://next-auth.
-
Updated
Mar 3, 2022 - Go
-
Updated
Feb 28, 2022 - Python
-
Updated
Feb 24, 2022 - Python
-
Updated
Feb 21, 2022 - JavaScript
-
Updated
Mar 3, 2022 - Python
-
Updated
Feb 21, 2022 - JavaScript
-
Updated
Mar 2, 2022 - Go
Describe the bug
If the environment (in my case the stage environment) is not setup as a a secure origin the library break up cause of the crypto library is not in window object
To Reproduce
Steps to reproduce the behavior:
- A server work on http that is setup as 'insecure origin'
- Start the login sequence
Expected behavior
Warning on library loading that check secure or
-
Updated
Feb 28, 2022 - C
-
Updated
Mar 3, 2022 - C#
-
Updated
Mar 2, 2022 - TypeScript
-
Updated
Mar 2, 2022 - JavaScript
Describe the issue:
The links not show hover states on hover on the getting started page.
How to reproduce:
- Navigate to getting started page
- hover over any link
Expected behavior:
Should indicate hover state for links
-
Updated
Mar 2, 2022 - Java
-
Updated
Mar 3, 2022 - Ruby
-
Updated
Feb 18, 2022 - C
-
Updated
Mar 3, 2022 - C#
-
Updated
Mar 2, 2022 - TypeScript
-
Updated
Feb 10, 2022 - Go
-
Updated
Dec 31, 2021
-
Updated
Jan 31, 2022 - Go
Our docs use cert-manager on GKE. It would be good to migrate them to use GKE workload identity so that the cluster does not need direct access to the GCP SA creds.
-
Updated
Dec 13, 2021 - JavaScript
-
Updated
Feb 19, 2022 - Go
-
Updated
Feb 6, 2022 - C#
-
Updated
Mar 1, 2022 - Go
Improve this page
Add a description, image, and links to the oidc topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the oidc topic, visit your repo's landing page and select "manage topics."
Asking about this since the NSA recently published guidance advising the public and private sectors to transition to cryptographic algorithms that are no less than sha384 & ec384 (elliptic curves).
While Edwards' Curves are different, its worth noting that prior to this update sha256 & secp256k1 were both on the list of acceptable cryptographic algorithms. My deduction was that 128-bit securit