Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
P
Pretix OIDC
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Iterations
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Locked files
Build
Pipelines
Jobs
Pipeline schedules
Test cases
Artifacts
Deploy
Model registry
Monitor
Service Desk
Analyze
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
KIF
Pretix OIDC
Commits
04f851fb
Commit
04f851fb
authored
2 years ago
by
Felix Schäfer
Browse files
Options
Downloads
Patches
Plain Diff
Add documentation
#1
parent
b8bd8308
No related branches found
No related tags found
No related merge requests found
Pipeline
#142148
passed
2 years ago
Stage: linting
Changes
1
Pipelines
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
README.md
+53
-0
53 additions, 0 deletions
README.md
with
53 additions
and
0 deletions
README.md
+
53
−
0
View file @
04f851fb
...
...
@@ -4,6 +4,59 @@ This is a plugin for [pretix](https://github.com/pretix/pretix).
OIDC authentication plugin for pretix
## Installation
Activate the virtual environment for your pretix installation and run
pip install git+https://gitlab.fachschaften.org/kif/pretix-oidc.git
To activate the OIDC authentication mechanism add
`pretix_oidc.auth.OIDCAuthBackend`
to the list of
`pretix.auth_backends`
in
your
`pretix.cfg`
. Add the OIDC configuration to that same file in a new
`oidc`
section, values without a default are mandatory:
[oidc]
# label on the login button,
# default: Login with OpenID connect
title=
# OIDC URIs, can generally be found unter .well-known/openid-configuration
# of your OIDC endpoint
issuer=
authorization_endpoint=
token_endpoint=
userinfo_endpoint=
end_session_endpoint=
jwks_uri=
# OIDC client ID and secret
client_id=
client_secret=
# comma-separated list of scopes to request
# default: openid
# recommended: openid,email,profile
scopes=
# what OIDC claim pretix should use to uniquely identify OIDC users
# default: sub
unique_attribute=
The callback URI on your pretix will be
`/oidc/callback/`
, enter this at the
appropriate place in your OIDC provider.
Please note that all users with the permission to change organizer settings
will have access to the team assignment rules. Those rules can add users to a
specific team based on an arbitrary OIDC claim when the users log in, this
means that users with the permission to change organizer settings might be
able to enumerate users with a certain OIDC claim when the users log in and
can lead to a data leak.
## Configuration
Users belonging to a team with the permission to change organizer settings can
add team assignment rules on the organizer page > team assignment rules. Users
can be added to a specific team of that organizer based on the value of
arbitrary OIDC attributes (claims). Team assignment rules will apply when
users log in, users matching newly created rules might need to log out and
back in for the assignment to take effect.
## Development setup
1.
Make sure that you have a working
[
pretix development
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment