Eiti prie turinio
WordPress.org

Lithuania

  • Temos
  • Įskiepiai
  • Naujienos
  • Apie
  • Susisiekti
  • Modeliai
  • Prisidėkite
  • Parsisiųsti WordPress
Parsisiųsti WordPress
WordPress.org

Plugin Directory

OpenID Connect Generic Client

  • Įkelkite įskiepį
  • Mano mėgstami
  • Prisijungti
  • Įkelkite įskiepį
  • Mano mėgstami
  • Prisijungti

OpenID Connect Generic Client

Autorius Jonathan Daggerhart
Parsisiųsti
  • Informacija
  • Atsiliepimai
  • Diegimas
  • Kūrimas
Pagalba

Aprašymas

This plugin allows to authenticate users against OpenID Connect OAuth2 API with Authorization Code Flow.
Once installed, it can be configured to automatically authenticate users (SSO), or provide a „Login with OpenID Connect”
button on the login form. After consent has been obtained, an existing user is automatically logged into WordPress, while
new users are created in WordPress database.

Much of the documentation can be found on the Settings > OpenID Connect Generic dashboard page.

Please submit issues to the Github repo: https://github.com/oidc-wp/openid-connect-generic

Diegimas

  1. Upload to the /wp-content/plugins/ directory
  2. Activate the plugin
  3. Visit Settings > OpenID Connect and configure to meet your needs

DUK

What is the client’s Redirect URI?

Most OAuth2 servers will require whitelisting a set of redirect URIs for security purposes. The Redirect URI provided
by this client is like so: https://example.com/wp-admin/admin-ajax.php?action=openid-connect-authorize

Replace example.com with your domain name and path to WordPress.

Can I change the client’s Redirect URI?

Some OAuth2 servers do not allow for a client redirect URI to contain a query string. The default URI provided by
this module leverages WordPress’s admin-ajax.php endpoint as an easy way to provide a route that does not include
HTML, but this will naturally involve a query string. Fortunately, this plugin provides a setting that will make use of
an alternate redirect URI that does not include a query string.

On the settings page for this plugin (Dashboard > Settings > OpenID Connect Generic) there is a checkbox for
Alternate Redirect URI. When checked, the plugin will use the Redirect URI
https://example.com/openid-connect-authorize.

Atsiliepimai

Excellent plugin and outstanding developer support

lmu007 14 vasario, 2026
I’m using this OpenID Connect Generic Client plugin to integrate WordPress with Microsoft Entra ID (Azure AD), and it works exactly as expected. During my setup I encountered a JWT validation issue related to JWKS handling. I reported it to the developer, and the response was absolutely impressive — the issue was understood, fixed, and resolved in less than 24 hours. This level of responsiveness and professionalism is rare and highly appreciated. The plugin itself is clean, flexible, and perfectly suited for enterprise authentication scenarios. It integrates smoothly with modern identity providers and gives full control over the configuration. Huge thanks to the developer for the fast support and for maintaining such a reliable and well-designed plugin.Highly recommended for anyone needing OpenID Connect / SSO on WordPress.

Great Plugin!

Robert 24 vasario, 2025
We have been using the plugin for several years. It’s without frills and works absolutely reliably. Many thanks!

It just works!

imoorena 28 rugpjūčio, 2024
As simple as it needs to be with no added cruft. Easy to configure and use.

Best OpenID plugin and free!

Matthias Kittsteiner 17 spalio, 2023
After testing multiple OpenID plugins – even paid one – this is by far the best. Thank you! Some suggestions for improvements: more flexible filtering, better documentation and enhanced multisite support.

Best Openid client plugin by far.

Xavi Ivars 27 gegužės, 2023
Every other plugin is simply a trap to get you paying a premium version. This one simply works as expected, with no bloatware. 🙂

The best there is, lightweight and easy to use

V.E.L 2 balandžio, 2023
Been trying all other OpenID plugins, ended up uninstalling them, premium issues, bloatware, etc. Tried this once only, now i’m using it on all my Wordpress sites. thanks a lot! I just hope it’s maintained.
Perskaityti visus atsiliepimus (20)

Programuotojai ir komandos nariai

“OpenID Connect Generic Client” yra atviro kodo programa. Prie jos sukūrimo prisidėję žmonės surašyti toliau.

Autoriai
  • Jonathan Daggerhart
  • Tim Nolte

Įskiepis “OpenID Connect Generic Client” išverstas į 2 kalbas. Dėkojame vertėjams už jų darbą.

Išverskite “OpenID Connect Generic Client” į savo kalbą.

Domina programavimas?

Peržiūrėkite kodą, naršykite SVN repozitorijoje, arba užsiprenumeruokite kodo pakeitimų žurnalą per RSS.

Pakeitimų istorija

3.11.3

  • Feature/improvement: Added configurable issuer setting for JWT validation.

3.11.2

  • Improvement: Support identity providers that omit algorithm parameter in JWKS (Microsoft Entra ID).

3.11.1

  • Fix bug created in 3.11.0 release when comparing issuer to derived expected value.

3.11.0

SECURITY RELEASE

  • Security: Added JWT signature verification using JWKS to prevent token forgery
  • Security: Enhanced token claim validation (exp, aud, iss, iat, nonce)
  • Security: Replaced weak state generation with cryptographically secure random_bytes()
  • Security: Fixed open redirect vulnerability in authentication flow
  • Security: Restricted SSL verification bypass to local development environments only
  • Security: Added nonce protection to debug mode to prevent information disclosure
  • Security: Added SSRF protection by default through use of wp_safe_remote_* functions
  • Feature: Added JWKS endpoint configuration setting
  • Feature: Added OpenID Connect discovery document support
  • Feature: Added customizable login button text setting
  • Improvement: Migrated to Composer-managed dependencies
  • Fix: Corrected issuer validation to properly extract base URL from endpoints
  • Fix: Identity token timestamp tracking

3.10.4

  • Fix issue with finding users on multisite after switch to user options in place of user meta.
  • Improvement: Retry logins for some IDP errors to bypass issue with Safari ITP. Also improves display of error messages that come from the IDP.

3.10.3

  • Fix issue with log corruption causing fatal error.
  • Fix: Fallback to a POST request for userinfo when GET fails.
  • Fix: Improves multisite compatibility by switching to *_user_options() functions.
  • Fix: Fix for WordPress user session length being very short when refresh tokens are enabled.

3.10.2

  • Fix: @socialmedialabs – Regression affecting SSO Auto Login with url handling improvement changes.

3.10.1

  • Chore: @daggerhart – Readme updates and clarifications.
  • Chore: @daggerhart – Release workflow updates.
  • Improved error handling for malformed urls.
  • Fix: @JUVOJustin – Change request for userinfo to GET.
  • Feature: @JUVOJustin – New filter for settings values openid-connect-generic-settings.
  • Feature: @JUVOJustin – New filter for state values openid-connect-generic-new-state-value.

3.10.0

  • Chore: @timnolte – Dependency updates.
  • Fix: @drzraf – Prevents running the auth url filter twice.
  • Fix: @timnolte – Updates the log cleanup handling to properly retain the configured number of log entries.
  • Fix: @timnolte – Updates the log display output to reflect the log retention policy.
  • Chore: @timnolte – Adds Unit Testing & New Local Development Environment.
  • Feature: @timnolte – Updates logging to allow for tracking processing time.
  • Feature: @menno-ll – Adds a remember me feature via a new filter.
  • Improvement: @menno-ll – Updates WP Cookie Expiration to Same as Session Length.

3.9.1

  • Improvement: @timnolte – Refactors Composer setup and GitHub Actions.
  • Improvement: @timnolte – Bumps WordPress tested version compatibility.

3.9.0

  • Feature: @matchaxnb – Added support for additional configuration constants.
  • Feature: @schanzen – Added support for agregated claims.
  • Fix: @rkcreation – Fixed access token not updating user metadata after login.
  • Fix: @danc1248 – Fixed user creation issue on Multisite Networks.
  • Feature: @RobjS – Added plugin singleton to support for more developer customization.
  • Feature: @jkouris – Added action hook to allow custom handling of session expiration.
  • Fix: @tommcc – Fixed admin CSS loading only on the plugin settings screen.
  • Feature: @rkcreation – Added method to refresh the user claim.
  • Feature: @Glowsome – Added acr_values support & verification checks that it when defined in options is honored.
  • Fix: @timnolte – Fixed regression which caused improper fallback on missing claims.
  • Fix: @slykar – Fixed missing query string handling in redirect URL.
  • Fix: @timnolte – Fixed issue with some user linking and user creation handling.
  • Improvement: @timnolte – Fixed plugin settings typos and screen formatting.
  • Security: @timnolte – Updated build tooling security vulnerabilities.
  • Improvement: @timnolte – Changed build tooling scripts.

3.8.5

  • Fix: @timnolte – Fixed missing URL request validation before use & ensure proper current page URL is setup for Redirect Back.
  • Fix: @timnolte – Fixed Redirect URL Logic to Handle Sub-directory Installs.
  • Fix: @timnolte – Fixed issue with redirecting user back when the openid_connect_generic_auth_url shortcode is used.

3.8.4

  • Fix: @timnolte – Fixed invalid State object access for redirection handling.
  • Improvement: @timnolte – Fixed local wp-env Docker development environment.
  • Improvement: @timnolte – Fixed Composer scripts for linting and static analysis.

3.8.3

  • Fix: @timnolte – Fixed problems with proper redirect handling.
  • Improvement: @timnolte – Changes redirect handling to use State instead of cookies.
  • Improvement: @timnolte – Refactored additional code to meet coding standards.

3.8.2

  • Fix: @timnolte – Fixed reported XSS vulnerability on WordPress login screen.

3.8.1

  • Fix: @timnolte – Prevent SSO redirect on password protected posts.
  • Fix: @timnolte – CI/CD build issues.
  • Fix: @timnolte – Invalid redirect handling on logout for Auto Login setting.

3.8.0

  • Feature: @timnolte – Ability to use 6 new constants for setting client configuration instead of storing in the DB.
  • Improvement: @timnolte – Plugin development & contribution updates.
  • Improvement: @timnolte – Refactored to meet WordPress coding standards.
  • Improvement: @timnolte – Refactored to provide localization.

See the previous changelogs here

Metainformacija

  • Version 3.11.3
  • Atnaujinta prieš 3 mėnesiai
  • Aktyvių instaliacijų 10 000+
  • WordPress versija 5.0 ar naujesnė
  • Ištestuota iki 6.9.0
  • PHP versija 7.4 ar naujesnė
  • Kalbos

    English (US), French (France) ir German.

    Išversti į savo kalbą

  • Žymos
    appsloginoauth2openidconnectsecurity
  • Daugiau

Įvertinimai

5 out of 5 stars.
  • 20 5-star reviews 5 stars 20
  • 0 4-star reviews 4 stars 0
  • 0 3-star reviews 3 stars 0
  • 0 2-star reviews 2 stars 0
  • 0 1-star reviews 1 star 0

Your review

See all reviews

Autoriai

  • Jonathan Daggerhart
  • Tim Nolte

Pagalba

Turite pastabų? Reikia pagalbos?

Peržiūrėti pagalbos forumą

  • Apie
  • Naujienos
  • Hostingo tiekėjai
  • Privatumas
  • Tinklalapių pavyzdžiai
  • Temos
  • Įskiepiai
  • Modeliai
  • Mokykitės
  • Pagalba
  • Kūrėjai
  • WordPress.tv ↗
  • Prisidėkite
  • Events
  • Paremkite ↗
  • Iniciatyva "Five for the Future"
  • WordPress.com ↗
  • Matt ↗
  • bbPress ↗
  • BuddyPress ↗
WordPress.org
WordPress.org

Lithuania

  • Visit our X (formerly Twitter) account
  • Apsilankykite mūsų Bluesky paskyroje
  • Visit our Mastodon account
  • Apsilankykite mūsų Threads paskyroje
  • Visit our Facebook page
  • Visit our Instagram account
  • Visit our LinkedIn account
  • Apsilankykite mūsų TikTok paskyroje
  • Visit our YouTube channel
  • Apsilankykite mūsų Tumblr paskyroje
Kodas – tai poezija.
The WordPress® trademark is the intellectual property of the WordPress Foundation.