-
Type:
Bug
-
Status: Resolved
-
Priority:
Trivial
-
Resolution: Duplicate
-
Affects Version/s: 11.0.0
-
Fix Version/s: None
-
Component/s: OpenID Connect
-
Labels:None
-
Environment:OpenAM 11.0.0
-
Rank:1|hzof2n:
Steps to reproduce:
- Install and setup two OpenAM 11.0.0 servers in site, behind a load balancer.
Load balancer : https://lb.example.com/openam/
OpenAM 1 : http://openam01.example.com:8080/openam/
OpenAM 2 : http://openam02.example.com:8080/openam/ - Log in to OpenAM and create an OAuth 2.0 provider.
- Access to https://lb.example.com/openam/.well-known/openid-configuration .
-> Every endpoint is not shown as the primary URL.{ "authorization_endpoint" : "http://openam01.example.com:8080/openam/oauth2/authorize", "check_session_iframe" : "http://openam01.example.com:8080/openam/oauth2/connect/checkSession", "claims_supported" : [ "phone", "email", "address", "openid", "profile" ], "end_session_endpoint" : "http://openam01.example.com:8080/openam/oauth2/connect/endSession", "id_token_siging_alg_values_supported" : [ "HmacSHA256", "HmacSHA512", "HmacSHA384" ], "issuer" : "http://openam01.example.com:8080/openam", "jwks_uri" : "", "registration_endpoint" : "http://openam01.example.com:8080/openam/oauth2/connect/register", "response_types_supported" : [ "id_token|org.forgerock.restlet.ext.oauth2.flow.responseTypes.IDTokenResponseType", "token|org.forgerock.restlet.ext.oauth2.flow.responseTypes.TokenResponseType", "code|org.forgerock.restlet.ext.oauth2.flow.responseTypes.CodeResponseType" ], "subject_types_supported" : [ "public" ], "token_endpoint" : "http://openam01.example.com:8080/openam/oauth2/access_token", "userinfo_endpoint" : "http://openam01.example.com:8080/openam/oauth2/userinfo", "version" : "3.0" }
- duplicates
-
OPENAM-5534 OAuth2/OIDC SSL connection is based on incoming request not on the site configuration
-
- Resolved
-