providers/oauth: post_logout_redirect_uri support#20011
providers/oauth: post_logout_redirect_uri support#20011PeshekDotDev wants to merge 15 commits intomainfrom
Conversation
✅ Deploy Preview for authentik-storybook ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
✅ Deploy Preview for authentik-docs ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
✅ Deploy Preview for authentik-integrations ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
Codecov Report❌ Patch coverage is Additional details and impacted files@@ Coverage Diff @@
## main #20011 +/- ##
==========================================
- Coverage 93.45% 93.42% -0.04%
==========================================
Files 991 992 +1
Lines 55948 56112 +164
==========================================
+ Hits 52285 52420 +135
- Misses 3663 3692 +29
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
|
authentik PR Installation instructions Instructions for docker-composeAdd the following block to your AUTHENTIK_IMAGE=ghcr.io/goauthentik/dev-server
AUTHENTIK_TAG=gh-9f1fbfec7a94175d4a3a159220b75ce3341d83c6
AUTHENTIK_OUTPOSTS__CONTAINER_IMAGE_BASE=ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)sAfterwards, run the upgrade commands from the latest release notes. Instructions for KubernetesAdd the following block to your authentik:
outposts:
container_image_base: ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s
global:
image:
repository: ghcr.io/goauthentik/dev-server
tag: gh-9f1fbfec7a94175d4a3a159220b75ce3341d83c6Afterwards, run the upgrade commands from the latest release notes. |
Co-authored-by: Jens L. <jens@goauthentik.io> Signed-off-by: Connor Peshek <connor@connorpeshek.me>
Co-authored-by: Jens L. <jens@goauthentik.io> Signed-off-by: Connor Peshek <connor@connorpeshek.me>
|
We've been struggling with this for a while — After applying this patch via volume mount on 2026.2.0, the full logout flow finally works as expected:
One thing worth noting: the patch introduces Thanks for pushing this forward. This is a real gap that affects anyone using RP-Initiated Logout with OIDC clients. |
Details
This adds proper support for post_logout_redirect_uri with oidc logouts while largely improving the way we interact with RP's during rp-initiated logout. With this, we will:
Validate the post_logout_redirect_uri
Send a logout notification back to the rp via frontchannel or backchannel if properly configured on the provider
Delete the access token for the provider
Redirect you to the post_logout_redirect_uri location
closes #10430
closes #19201
Checklist
ak test authentik/)make lint-fix)If an API change has been made
make gen-build)If changes to the frontend have been made
make web)If applicable
make docs)