Replies: 1 comment 4 replies
-
@kulmann you have it running. Can you share your config (again 😀) |
Beta Was this translation helpful? Give feedback.
4 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Environment:
OpenCloud: Latest rolling release
Authelia: Latest version
Operating Systems: Windows 11 (Desktop app), iOS 18.5 (Mobile app)
Reverse Proxy: Traefik v3.3.1
Deployment: Docker Compose on Raspberry Pi 5
Issue Description:
I've successfully configured Authelia as the external identity provider for OpenCloud. The web interface authentication works perfectly through Authelia with 2FA enabled. However, I'm experiencing persistent issues with both the desktop and iOS clients:
Desktop Client:
After browser authentication through Authelia (which completes successfully), the app displays "Failed to retrieve user information from server". The browser login works but doesn't redirect back to the desktop app properly.
iOS Client: Similar issue, but with an "invalid_client" error message. Log shows: "Client with id 'OpenCloudIOS' did not match 'redirect_uri' value 'oc://ios.opencloud.eu'"
Current Configuration and Attempted Solutions:
I've configured Authelia with client IDs for all app types:
yaml# Authelia OIDC configuration includes:
clients:
public: true
authorization_policy: two_factor
consent_mode: explicit
scopes: [openid, groups, profile, email, offline_access]
redirect_uris:
OpenCloud configuration:
yaml# OpenCloud OIDC settings:
PROXY_ENABLE_OIDC: "true"
OC_OIDC_ISSUER: "https://auth.example.org"
DESKTOP_OIDC_CLIENT_ID: "desktop"
PROXY_OIDC_ACCESS_TOKEN_VERIFY_METHOD: "none"
PROXY_OIDC_SKIP_VERIFICATION: "true"
PROXY_USER_OIDC_CLAIM: "preferred_username"
When examining the logs, I found:
ERR Error mapping role names to role ids error="no roles in user claims"
DBG GetUserByClaim error="error: not found: (&(objectclass=inetOrgPerson)(uid=preferred_username:Example)(!(openclouduserenabled=FALSE)))"
What I've Tried:
Added multiple protocol handlers and redirect URIs to Authelia clients
Set PROXY_USER_OIDC_VALUE_PREFIX: ""
Enabled PROXY_OIDC_FAKE_USERINFO: "true"
Configured various bypass rules in the proxy.yaml
Added explicit OIDC endpoints in OpenCloud config
Switched authorization_policy to one_factor for testing
Changed consent_mode to auto
Extended WebDAV bypass rules in Authelia
Questions:
Is there a known issue with the desktop/iOS client OIDC redirect flow?
How should claims like 'preferred_username' be correctly mapped to avoid the "preferred_username:Example" format?
Is there a recommended configuration for this specific setup (Authelia + OpenCloud + Desktop/Mobile clients)?
Are there specific protocol handlers or redirect URIs that must be configured exactly for the app callbacks to work?
Should I consider using app-specific passwords instead? If so, how do I configure this with Authelia?
Beta Was this translation helpful? Give feedback.
All reactions