freescout/modules/OAuth
Erki Aas 7b5b15aebc
ci/woodpecker/push/woodpecker Pipeline was successful Details
Add OAuth module from repository
2024-02-01 15:20:10 +02:00
..
Config Add OAuth module from repository 2024-02-01 15:20:10 +02:00
Console Add OAuth module from repository 2024-02-01 15:20:10 +02:00
Database Add OAuth module from repository 2024-02-01 15:20:10 +02:00
Entities Add OAuth module from repository 2024-02-01 15:20:10 +02:00
Http Add OAuth module from repository 2024-02-01 15:20:10 +02:00
Providers Add OAuth module from repository 2024-02-01 15:20:10 +02:00
Public Add OAuth module from repository 2024-02-01 15:20:10 +02:00
Resources Add OAuth module from repository 2024-02-01 15:20:10 +02:00
Tests Add OAuth module from repository 2024-02-01 15:20:10 +02:00
README.md Add OAuth module from repository 2024-02-01 15:20:10 +02:00
composer.json Add OAuth module from repository 2024-02-01 15:20:10 +02:00
module.json Add OAuth module from repository 2024-02-01 15:20:10 +02:00
start.php Add OAuth module from repository 2024-02-01 15:20:10 +02:00

README.md

OAuth FreeScout

This module is intended to provide oauth authentication to freescout.

Module was tested on keycloak oauth provider with confidential openid-connect client.

Module is require php curl extension on server.

Currently module fully replace login form with redirection to oauth provider login form. If you need to perform ordinary login with basic form, add disable_oauth get parameter to login path (/login?disable_oauth=1)

User must be registered before oauth login.

Installation

  • place module source to Modules folder of your FreeScout installation, module must have OAuth folder name to work propperly. If you are clonning repo with git, just add folder name in the end of git clone command.
  • enable module in modules admin panel
  • configure module on settings page (client id/secret/etc)

Provider Specific

Azure Active Directory (AAD)

Register an App Registration in Azure Active Directory with scopes openid, email and profile.

Setting Value
Client ID <App Registration Client ID>
Client Secret <App Registration Client secret>
Authorization Endpoint URL https://login.microsoftonline.com/{tenant-id}/oauth2/v2.0/authorize?scope=email+profile+openid
Token Endpoint URL https://login.microsoftonline.com/{tenant-id}/oauth2/v2.0/token
User Info Endpoint URL https://graph.microsoft.com/oidc/userinfo