579 lines
		
	
	
		
			30 KiB
		
	
	
	
		
			Markdown
		
	
	
	
			
		
		
	
	
			579 lines
		
	
	
		
			30 KiB
		
	
	
	
		
			Markdown
		
	
	
	
| ---
 | |
| id: alpha-config
 | |
| title: Alpha Configuration
 | |
| ---
 | |
| 
 | |
| :::warning
 | |
| This page contains documentation for alpha features.
 | |
| We reserve the right to make breaking changes to the features detailed within this page with no notice.
 | |
| 
 | |
| Options described in this page may be changed, removed, renamed or moved without prior warning.
 | |
| Please beware of this before you use alpha configuration options.
 | |
| :::
 | |
| 
 | |
| This page details a set of **alpha** configuration options in a new format.
 | |
| Going forward we are intending to add structured configuration in YAML format to
 | |
| replace the existing TOML based configuration file and flags.
 | |
| 
 | |
| Below is a reference for the structure of the configuration, with
 | |
| [AlphaOptions](#alphaoptions) as the root of the configuration.
 | |
| 
 | |
| When using alpha configuration, your config file will look something like below:
 | |
| 
 | |
| ```yaml
 | |
| upstreams:
 | |
|   - id: ...
 | |
|     ...: ...
 | |
| injectRequestHeaders:
 | |
|   - name: ...
 | |
|     ...: ...
 | |
| injectResponseHeaders:
 | |
|   - name: ...
 | |
|     ...: ...
 | |
| ```
 | |
| 
 | |
| Please browse the [reference](#configuration-reference) below for the structure
 | |
| of the new configuration format.
 | |
| 
 | |
| ## Using Alpha Configuration
 | |
| 
 | |
| To use the new **alpha** configuration, generate a YAML file based on the format
 | |
| described in the [reference](#configuration-reference) below.
 | |
| 
 | |
| Provide the path to this file using the `--alpha-config` flag.
 | |
| 
 | |
| :::note
 | |
| When using the `--alpha-config` flag, some options are no longer available.
 | |
| See [removed options](#removed-options) below for more information.
 | |
| :::
 | |
| 
 | |
| ### Converting configuration to the new structure
 | |
| 
 | |
| Before adding the new `--alpha-config` option, start OAuth2 Proxy using the
 | |
| `convert-config-to-alpha` flag to convert existing configuration to the new format.
 | |
| 
 | |
| ```bash
 | |
| oauth2-proxy --convert-config-to-alpha --config ./path/to/existing/config.cfg
 | |
| ```
 | |
| 
 | |
| This will convert any options supported by the new format to YAML and print the
 | |
| new configuration to `STDOUT`.
 | |
| 
 | |
| Copy this to a new file, remove any options from your existing configuration
 | |
| noted in [removed options](#removed-options) and then start OAuth2 Proxy using
 | |
| the new config.
 | |
| 
 | |
| ```bash
 | |
| oauth2-proxy --alpha-config ./path/to/new/config.yaml --config ./path/to/existing/config.cfg
 | |
| ```
 | |
| 
 | |
| ## Using ENV variables in the alpha configuration
 | |
| 
 | |
| The alpha package supports the use of environment variables in place of yaml keys, allowing sensitive values to be pulled from somewhere other than the yaml file.
 | |
| When using environment variables, your yaml will look like this:
 | |
| 
 | |
| ```yaml
 | |
|     providers:
 | |
|     - provider: azure
 | |
|       clientSecret: ${CLIENT_SECRET}
 | |
|       ...
 | |
| ```
 | |
| Where CLIENT_SECRET is an environment variable.
 | |
| More information and available patterns can be found [here](https://github.com/a8m/envsubst#docs)
 | |
| 
 | |
| ## Removed options
 | |
| 
 | |
| The following flags/options and their respective environment variables are no
 | |
| longer available when using alpha configuration:
 | |
| 
 | |
| <!-- Legacy Upstream FlagSet -->
 | |
| - `flush-interval`/`flush_interval`
 | |
| - `pass-host-header`/`pass_host_header`
 | |
| - `proxy-websockets`/`proxy_websockets`
 | |
| - `ssl-upstream-insecure-skip-verify`/`ssl_upstream_insecure_skip_verify`
 | |
| - `upstream`/`upstreams`
 | |
| 
 | |
| <!-- Legacy Headers FlagSet -->
 | |
| - `pass-basic-auth`/`pass_basic_auth`
 | |
| - `pass-access-token`/`pass_access_token`
 | |
| - `pass-user-headers`/`pass_user_headers`
 | |
| - `pass-authorization-header`/`pass_authorization_header`
 | |
| - `set-basic-auth`/`set_basic_auth`
 | |
| - `set-xauthrequest`/`set_xauthrequest`
 | |
| - `set-authorization-header`/`set_authorization_header`
 | |
| - `prefer-email-to-user`/`prefer_email_to_user`
 | |
| - `basic-auth-password`/`basic_auth_password`
 | |
| - `skip-auth-strip-headers`/`skip_auth_strip_headers`
 | |
| 
 | |
| <!-- Legacy provider FlagSet -->
 | |
| - `client-id`/`client_id`
 | |
| - `client-secret`/`client_secret`, and `client-secret-file`/`client_secret_file`
 | |
| - `provider`
 | |
| - `provider-display-name`/`provider_display_name`
 | |
| - `provider-ca-file`/`provider_ca_files`
 | |
| - `login-url`/`login_url`
 | |
| - `redeem-url`/`redeem_url`
 | |
| - `profile-url`/`profile_url`
 | |
| - `resource`
 | |
| - `validate-url`/`validate_url`
 | |
| - `scope`
 | |
| - `prompt`
 | |
| - `approval-prompt`/`approval_prompt`
 | |
| - `acr-values`/`acr_values`
 | |
| - `user-id-claim`/`user_id_claim`
 | |
| - `allowed-group`/`allowed_groups`
 | |
| - `allowed-role`/`allowed_roles`
 | |
| - `jwt-key`/`jwt_key`
 | |
| - `jwt-key-file`/`jwt_key_file`
 | |
| - `pubjwk-url`/`pubjwk_url`
 | |
| 
 | |
| and all provider-specific options, i.e. any option whose name includes `oidc`,
 | |
| `azure`, `bitbucket`, `github`, `gitlab`, `google` or `keycloak`.  Attempting to
 | |
| use any of these options via flags or via config when `--alpha-config` is
 | |
| set will result in an error.
 | |
| 
 | |
| :::important
 | |
| You must remove these options before starting OAuth2 Proxy with `--alpha-config`
 | |
| :::
 | |
| 
 | |
| ## Configuration Reference
 | |
| 
 | |
| <!--- THIS FILE IS AUTOGENERATED!!! DO NOT EDIT!!! -->
 | |
| 
 | |
| ### ADFSOptions
 | |
| 
 | |
| (**Appears on:** [Provider](#provider))
 | |
| 
 | |
| 
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `skipScope` | _bool_ | Skip adding the scope parameter in login request<br/>Default value is 'false' |
 | |
| 
 | |
| ### AWSIAMConfig
 | |
| 
 | |
| (**Appears on:** [AlphaOptions](#alphaoptions))
 | |
| 
 | |
| 
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `serviceName` | _string_ | AWS service redis service being used. "elasticache" or "memorydb" |
 | |
| | `clusterName` | _string_ | AWS Cluster name |
 | |
| | `userName` | _string_ | AWS Username |
 | |
| 
 | |
| ### AlphaOptions
 | |
| 
 | |
| AlphaOptions contains alpha structured configuration options.
 | |
| Usage of these options allows users to access alpha features that are not
 | |
| available as part of the primary configuration structure for OAuth2 Proxy.
 | |
| 
 | |
| :::warning
 | |
| The options within this structure are considered alpha.
 | |
| They may change between releases without notice.
 | |
| :::
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `upstreamConfig` | _[UpstreamConfig](#upstreamconfig)_ | UpstreamConfig is used to configure upstream servers.<br/>Once a user is authenticated, requests to the server will be proxied to<br/>these upstream servers based on the path mappings defined in this list. |
 | |
| | `injectRequestHeaders` | _[[]Header](#header)_ | InjectRequestHeaders is used to configure headers that should be added<br/>to requests to upstream servers.<br/>Headers may source values from either the authenticated user's session<br/>or from a static secret value. |
 | |
| | `injectResponseHeaders` | _[[]Header](#header)_ | InjectResponseHeaders is used to configure headers that should be added<br/>to responses from the proxy.<br/>This is typically used when using the proxy as an external authentication<br/>provider in conjunction with another proxy such as NGINX and its<br/>auth_request module.<br/>Headers may source values from either the authenticated user's session<br/>or from a static secret value. |
 | |
| | `server` | _[Server](#server)_ | Server is used to configure the HTTP(S) server for the proxy application.<br/>You may choose to run both HTTP and HTTPS servers simultaneously.<br/>This can be done by setting the BindAddress and the SecureBindAddress simultaneously.<br/>To use the secure server you must configure a TLS certificate and key. |
 | |
| | `metricsServer` | _[Server](#server)_ | MetricsServer is used to configure the HTTP(S) server for metrics.<br/>You may choose to run both HTTP and HTTPS servers simultaneously.<br/>This can be done by setting the BindAddress and the SecureBindAddress simultaneously.<br/>To use the secure server you must configure a TLS certificate and key. |
 | |
| | `providers` | _[Providers](#providers)_ | Providers is used to configure your provider. **Multiple-providers is not<br/>yet working.** [This feature is tracked in<br/>#925](https://github.com/oauth2-proxy/oauth2-proxy/issues/926) |
 | |
| | `redisSessionAWSIAMConfig` | _[AWSIAMConfig](#awsiamconfig)_ | AWS IAM Options is used to configure IAM authentication for your redis instance. |
 | |
| 
 | |
| ### AzureOptions
 | |
| 
 | |
| (**Appears on:** [Provider](#provider))
 | |
| 
 | |
| 
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `tenant` | _string_ | Tenant directs to a tenant-specific or common (tenant-independent) endpoint<br/>Default value is 'common' |
 | |
| | `graphGroupField` | _string_ | GraphGroupField configures the group field to be used when building the groups list from Microsoft Graph<br/>Default value is 'id' |
 | |
| 
 | |
| ### BitbucketOptions
 | |
| 
 | |
| (**Appears on:** [Provider](#provider))
 | |
| 
 | |
| 
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `team` | _string_ | Team sets restrict logins to members of this team |
 | |
| | `repository` | _string_ | Repository sets restrict logins to user with access to this repository |
 | |
| 
 | |
| ### ClaimSource
 | |
| 
 | |
| (**Appears on:** [HeaderValue](#headervalue))
 | |
| 
 | |
| ClaimSource allows loading a header value from a claim within the session
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `claim` | _string_ | Claim is the name of the claim in the session that the value should be<br/>loaded from. Available claims: `access_token` `id_token` `created_at`<br/>`expires_on` `refresh_token` `email` `user` `groups` `preferred_username`. |
 | |
| | `prefix` | _string_ | Prefix is an optional prefix that will be prepended to the value of the<br/>claim if it is non-empty. |
 | |
| | `basicAuthPassword` | _[SecretSource](#secretsource)_ | BasicAuthPassword converts this claim into a basic auth header.<br/>Note the value of claim will become the basic auth username and the<br/>basicAuthPassword will be used as the password value. |
 | |
| 
 | |
| ### Duration
 | |
| #### (`string` alias)
 | |
| 
 | |
| (**Appears on:** [Upstream](#upstream))
 | |
| 
 | |
| Duration is as string representation of a period of time.
 | |
| A duration string is a is a possibly signed sequence of decimal numbers,
 | |
| each with optional fraction and a unit suffix, such as "300ms", "-1.5h" or "2h45m".
 | |
| Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h".
 | |
| 
 | |
| ### GitHubOptions
 | |
| 
 | |
| (**Appears on:** [Provider](#provider))
 | |
| 
 | |
| 
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `org` | _string_ | Org sets restrict logins to members of this organisation |
 | |
| | `team` | _string_ | Team sets restrict logins to members of this team |
 | |
| | `repo` | _string_ | Repo sets restrict logins to collaborators of this repository |
 | |
| | `token` | _string_ | Token is the token to use when verifying repository collaborators<br/>it must have push access to the repository |
 | |
| | `users` | _[]string_ | Users allows users with these usernames to login<br/>even if they do not belong to the specified org and team or collaborators |
 | |
| 
 | |
| ### GitLabOptions
 | |
| 
 | |
| (**Appears on:** [Provider](#provider))
 | |
| 
 | |
| 
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `group` | _[]string_ | Group sets restrict logins to members of this group |
 | |
| | `projects` | _[]string_ | Projects restricts logins to members of these projects |
 | |
| 
 | |
| ### GoogleOptions
 | |
| 
 | |
| (**Appears on:** [Provider](#provider))
 | |
| 
 | |
| 
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `group` | _[]string_ | Groups sets restrict logins to members of this Google group |
 | |
| | `adminEmail` | _string_ | AdminEmail is the Google admin to impersonate for api calls |
 | |
| | `serviceAccountJson` | _string_ | ServiceAccountJSON is the path to the service account json credentials |
 | |
| | `useApplicationDefaultCredentials` | _bool_ | UseApplicationDefaultCredentials is a boolean whether to use Application Default Credentials instead of a ServiceAccountJSON |
 | |
| | `targetPrincipal` | _string_ | TargetPrincipal is the Google Service Account used for Application Default Credentials |
 | |
| 
 | |
| ### Header
 | |
| 
 | |
| (**Appears on:** [AlphaOptions](#alphaoptions))
 | |
| 
 | |
| Header represents an individual header that will be added to a request or
 | |
| response header.
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `name` | _string_ | Name is the header name to be used for this set of values.<br/>Names should be unique within a list of Headers. |
 | |
| | `preserveRequestValue` | _bool_ | PreserveRequestValue determines whether any values for this header<br/>should be preserved for the request to the upstream server.<br/>This option only applies to injected request headers.<br/>Defaults to false (headers that match this header will be stripped). |
 | |
| | `values` | _[[]HeaderValue](#headervalue)_ | Values contains the desired values for this header |
 | |
| 
 | |
| ### HeaderValue
 | |
| 
 | |
| (**Appears on:** [Header](#header))
 | |
| 
 | |
| HeaderValue represents a single header value and the sources that can
 | |
| make up the header value
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `value` | _[]byte_ | Value expects a base64 encoded string value. |
 | |
| | `fromEnv` | _string_ | FromEnv expects the name of an environment variable. |
 | |
| | `fromFile` | _string_ | FromFile expects a path to a file containing the secret value. |
 | |
| | `claim` | _string_ | Claim is the name of the claim in the session that the value should be<br/>loaded from. Available claims: `access_token` `id_token` `created_at`<br/>`expires_on` `refresh_token` `email` `user` `groups` `preferred_username`. |
 | |
| | `prefix` | _string_ | Prefix is an optional prefix that will be prepended to the value of the<br/>claim if it is non-empty. |
 | |
| | `basicAuthPassword` | _[SecretSource](#secretsource)_ | BasicAuthPassword converts this claim into a basic auth header.<br/>Note the value of claim will become the basic auth username and the<br/>basicAuthPassword will be used as the password value. |
 | |
| 
 | |
| ### KeycloakOptions
 | |
| 
 | |
| (**Appears on:** [Provider](#provider))
 | |
| 
 | |
| 
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `groups` | _[]string_ | Group enables to restrict login to members of indicated group |
 | |
| | `roles` | _[]string_ | Role enables to restrict login to users with role (only available when using the keycloak-oidc provider) |
 | |
| 
 | |
| ### LoginGovOptions
 | |
| 
 | |
| (**Appears on:** [Provider](#provider))
 | |
| 
 | |
| 
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `jwtKey` | _string_ | JWTKey is a private key in PEM format used to sign JWT, |
 | |
| | `jwtKeyFile` | _string_ | JWTKeyFile is a path to the private key file in PEM format used to sign the JWT |
 | |
| | `pubjwkURL` | _string_ | PubJWKURL is the JWK pubkey access endpoint |
 | |
| 
 | |
| ### LoginURLParameter
 | |
| 
 | |
| (**Appears on:** [Provider](#provider))
 | |
| 
 | |
| LoginURLParameter is the configuration for a single query parameter that
 | |
| can be passed through from the `/oauth2/start` endpoint to the IdP login
 | |
| URL.  The "default" option specifies the default value or values (if any)
 | |
| that will be passed to the IdP for this parameter, and "allow" is a list
 | |
| of options for ways in which this parameter can be set or overridden via
 | |
| the query string to `/oauth2/start`.
 | |
| If _only_ a default is specified and no "allow" then the parameter is
 | |
| effectively fixed - the default value will always be used and anything
 | |
| passed to the start URL will be ignored.  If _only_ "allow" is specified
 | |
| but no default then the parameter will only be passed on to the IdP if
 | |
| the caller provides it, and no value will be sent otherwise.
 | |
| 
 | |
| Examples:
 | |
| 
 | |
| # A parameter whose value is fixed
 | |
| 
 | |
| ```
 | |
| name: organization
 | |
| default:
 | |
| - myorg
 | |
| ```
 | |
| 
 | |
| A parameter that is not passed by default, but may be set to one of a
 | |
| fixed set of values
 | |
| 
 | |
| ```
 | |
| name: prompt
 | |
| allow:
 | |
| - value: login
 | |
| - value: consent
 | |
| - value: select_account
 | |
| ```
 | |
| 
 | |
| A parameter that is passed by default but may be overridden by one of
 | |
| a fixed set of values
 | |
| 
 | |
| ```
 | |
| name: prompt
 | |
| default: ["login"]
 | |
| allow:
 | |
| - value: consent
 | |
| - value: select_account
 | |
| ```
 | |
| 
 | |
| A parameter that may be overridden, but only by values that match a
 | |
| regular expression.  For example to restrict `login_hint` to email
 | |
| addresses in your organization's domain:
 | |
| 
 | |
| ```
 | |
| name: login_hint
 | |
| allow:
 | |
| - pattern: '^[^@]*@example\.com$'
 | |
| # this allows at most one "@" sign, and requires "example.com" domain.
 | |
| ```
 | |
| 
 | |
| Note that the YAML rules around exactly which characters are allowed
 | |
| and/or require escaping in different types of string literals are
 | |
| convoluted.  For regular expressions the single quoted form is simplest
 | |
| as backslash is not considered to be an escape character.  Alternatively
 | |
| use the "chomped block" format `|-`:
 | |
| 
 | |
| ```
 | |
|   - pattern: |-
 | |
|     ^[^@]*@example\.com$
 | |
| 
 | |
| ```
 | |
| 
 | |
| The hyphen is important, a `|` block would have a trailing newline
 | |
| character.
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `name` | _string_ | Name specifies the name of the query parameter. |
 | |
| | `default` | _[]string_ |  _(Optional)_ Default specifies a default value or values that will be<br/>passed to the IdP if not overridden. |
 | |
| | `allow` | _[[]URLParameterRule](#urlparameterrule)_ |  _(Optional)_ Allow specifies rules about how the default (if any) may be<br/>overridden via the query string to `/oauth2/start`.  Only<br/>values that match one or more of the allow rules will be<br/>forwarded to the IdP. |
 | |
| 
 | |
| ### MicrosoftEntraIDOptions
 | |
| 
 | |
| (**Appears on:** [Provider](#provider))
 | |
| 
 | |
| 
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `allowedTenants` | _[]string_ | AllowedTenants is a list of allowed tenants. In case of multi-tenant apps, incoming tokens are<br/>issued by different issuers and OIDC issuer verification needs to be disabled.<br/>When not specified, all tenants are allowed. Redundant for single-tenant apps<br/>(regular ID token validation matches the issuer). |
 | |
| | `federatedTokenAuth` | _bool_ | FederatedTokenAuth enable oAuth2 client authentication with federated token projected<br/>by Entra Workload Identity plugin, instead of client secret. |
 | |
| 
 | |
| ### OIDCOptions
 | |
| 
 | |
| (**Appears on:** [Provider](#provider))
 | |
| 
 | |
| 
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `issuerURL` | _string_ | IssuerURL is the OpenID Connect issuer URL<br/>eg: https://accounts.google.com |
 | |
| | `insecureAllowUnverifiedEmail` | _bool_ | InsecureAllowUnverifiedEmail prevents failures if an email address in an id_token is not verified<br/>default set to 'false' |
 | |
| | `insecureSkipIssuerVerification` | _bool_ | InsecureSkipIssuerVerification skips verification of ID token issuers. When false, ID Token Issuers must match the OIDC discovery URL<br/>default set to 'false' |
 | |
| | `insecureSkipNonce` | _bool_ | InsecureSkipNonce skips verifying the ID Token's nonce claim that must match<br/>the random nonce sent in the initial OAuth flow. Otherwise, the nonce is checked<br/>after the initial OAuth redeem & subsequent token refreshes.<br/>default set to 'true'<br/>Warning: In a future release, this will change to 'false' by default for enhanced security. |
 | |
| | `skipDiscovery` | _bool_ | SkipDiscovery allows to skip OIDC discovery and use manually supplied Endpoints<br/>default set to 'false' |
 | |
| | `jwksURL` | _string_ | JwksURL is the OpenID Connect JWKS URL<br/>eg: https://www.googleapis.com/oauth2/v3/certs |
 | |
| | `publicKeyFiles` | _[]string_ | PublicKeyFiles is a list of paths pointing to public key files in PEM format to use<br/>for verifying JWT tokens |
 | |
| | `emailClaim` | _string_ | EmailClaim indicates which claim contains the user email,<br/>default set to 'email' |
 | |
| | `groupsClaim` | _string_ | GroupsClaim indicates which claim contains the user groups<br/>default set to 'groups' |
 | |
| | `userIDClaim` | _string_ | UserIDClaim indicates which claim contains the user ID<br/>default set to 'email' |
 | |
| | `audienceClaims` | _[]string_ | AudienceClaim allows to define any claim that is verified against the client id<br/>By default `aud` claim is used for verification. |
 | |
| | `extraAudiences` | _[]string_ | ExtraAudiences is a list of additional audiences that are allowed<br/>to pass verification in addition to the client id. |
 | |
| 
 | |
| ### Provider
 | |
| 
 | |
| (**Appears on:** [Providers](#providers))
 | |
| 
 | |
| Provider holds all configuration for a single provider
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `clientID` | _string_ | ClientID is the OAuth Client ID that is defined in the provider<br/>This value is required for all providers. |
 | |
| | `clientSecret` | _string_ | ClientSecret is the OAuth Client Secret that is defined in the provider<br/>This value is required for all providers. |
 | |
| | `clientSecretFile` | _string_ | ClientSecretFile is the name of the file<br/>containing the OAuth Client Secret, it will be used if ClientSecret is not set. |
 | |
| | `keycloakConfig` | _[KeycloakOptions](#keycloakoptions)_ | KeycloakConfig holds all configurations for Keycloak provider. |
 | |
| | `azureConfig` | _[AzureOptions](#azureoptions)_ | AzureConfig holds all configurations for Azure provider. |
 | |
| | `microsoftEntraIDConfig` | _[MicrosoftEntraIDOptions](#microsoftentraidoptions)_ | MicrosoftEntraIDConfig holds all configurations for Entra ID provider. |
 | |
| | `ADFSConfig` | _[ADFSOptions](#adfsoptions)_ | ADFSConfig holds all configurations for ADFS provider. |
 | |
| | `bitbucketConfig` | _[BitbucketOptions](#bitbucketoptions)_ | BitbucketConfig holds all configurations for Bitbucket provider. |
 | |
| | `githubConfig` | _[GitHubOptions](#githuboptions)_ | GitHubConfig holds all configurations for GitHubC provider. |
 | |
| | `gitlabConfig` | _[GitLabOptions](#gitlaboptions)_ | GitLabConfig holds all configurations for GitLab provider. |
 | |
| | `googleConfig` | _[GoogleOptions](#googleoptions)_ | GoogleConfig holds all configurations for Google provider. |
 | |
| | `oidcConfig` | _[OIDCOptions](#oidcoptions)_ | OIDCConfig holds all configurations for OIDC provider<br/>or providers utilize OIDC configurations. |
 | |
| | `loginGovConfig` | _[LoginGovOptions](#logingovoptions)_ | LoginGovConfig holds all configurations for LoginGov provider. |
 | |
| | `id` | _string_ | ID should be a unique identifier for the provider.<br/>This value is required for all providers. |
 | |
| | `provider` | _[ProviderType](#providertype)_ | Type is the OAuth provider<br/>must be set from the supported providers group,<br/>otherwise 'Google' is set as default |
 | |
| | `name` | _string_ | Name is the providers display name<br/>if set, it will be shown to the users in the login page. |
 | |
| | `caFiles` | _[]string_ | CAFiles is a list of paths to CA certificates that should be used when connecting to the provider.<br/>If not specified, the default Go trust sources are used instead |
 | |
| | `useSystemTrustStore` | _bool_ | UseSystemTrustStore determines if your custom CA files and the system trust store are used<br/>If set to true, your custom CA files and the system trust store are used otherwise only your custom CA files. |
 | |
| | `loginURL` | _string_ | LoginURL is the authentication endpoint |
 | |
| | `loginURLParameters` | _[[]LoginURLParameter](#loginurlparameter)_ | LoginURLParameters defines the parameters that can be passed from the start URL to the IdP login URL |
 | |
| | `authRequestResponseMode` | _string_ | AuthRequestResponseMode defines the response mode to request during authorization request |
 | |
| | `redeemURL` | _string_ | RedeemURL is the token redemption endpoint |
 | |
| | `profileURL` | _string_ | ProfileURL is the profile access endpoint |
 | |
| | `skipClaimsFromProfileURL` | _bool_ | SkipClaimsFromProfileURL allows to skip request to Profile URL for resolving claims not present in id_token<br/>default set to 'false' |
 | |
| | `resource` | _string_ | ProtectedResource is the resource that is protected (Azure AD and ADFS only) |
 | |
| | `validateURL` | _string_ | ValidateURL is the access token validation endpoint |
 | |
| | `scope` | _string_ | Scope is the OAuth scope specification |
 | |
| | `allowedGroups` | _[]string_ | AllowedGroups is a list of restrict logins to members of this group |
 | |
| | `code_challenge_method` | _string_ | The code challenge method |
 | |
| | `backendLogoutURL` | _string_ | URL to call to perform backend logout, `{id_token}` would be replaced by the actual `id_token` if available in the session |
 | |
| 
 | |
| ### ProviderType
 | |
| #### (`string` alias)
 | |
| 
 | |
| (**Appears on:** [Provider](#provider))
 | |
| 
 | |
| ProviderType is used to enumerate the different provider type options
 | |
| Valid options are: adfs, azure, bitbucket, digitalocean facebook, github,
 | |
| gitlab, google, keycloak, keycloak-oidc, linkedin, login.gov, nextcloud
 | |
| and oidc.
 | |
| 
 | |
| ### Providers
 | |
| 
 | |
| #### ([[]Provider](#provider) alias)
 | |
| 
 | |
| (**Appears on:** [AlphaOptions](#alphaoptions))
 | |
| 
 | |
| The provider can be selected using the `provider` configuration value, or
 | |
| set in the [`providers` array using
 | |
| AlphaConfig](https://oauth2-proxy.github.io/oauth2-proxy/configuration/alpha-config#providers).
 | |
| However, [**the feature to implement multiple providers is not
 | |
| complete**](https://github.com/oauth2-proxy/oauth2-proxy/issues/926).
 | |
| 
 | |
| ### SecretSource
 | |
| 
 | |
| (**Appears on:** [ClaimSource](#claimsource), [HeaderValue](#headervalue), [TLS](#tls))
 | |
| 
 | |
| SecretSource references an individual secret value.
 | |
| Only one source within the struct should be defined at any time.
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `value` | _[]byte_ | Value expects a base64 encoded string value. |
 | |
| | `fromEnv` | _string_ | FromEnv expects the name of an environment variable. |
 | |
| | `fromFile` | _string_ | FromFile expects a path to a file containing the secret value. |
 | |
| 
 | |
| ### Server
 | |
| 
 | |
| (**Appears on:** [AlphaOptions](#alphaoptions))
 | |
| 
 | |
| Server represents the configuration for an HTTP(S) server
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `BindAddress` | _string_ | BindAddress is the address on which to serve traffic.<br/>Leave blank or set to "-" to disable. |
 | |
| | `SecureBindAddress` | _string_ | SecureBindAddress is the address on which to serve secure traffic.<br/>Leave blank or set to "-" to disable. |
 | |
| | `TLS` | _[TLS](#tls)_ | TLS contains the information for loading the certificate and key for the<br/>secure traffic and further configuration for the TLS server. |
 | |
| 
 | |
| ### TLS
 | |
| 
 | |
| (**Appears on:** [Server](#server))
 | |
| 
 | |
| TLS contains the information for loading a TLS certificate and key
 | |
| as well as an optional minimal TLS version that is acceptable.
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `Key` | _[SecretSource](#secretsource)_ | Key is the TLS key data to use.<br/>Typically this will come from a file. |
 | |
| | `Cert` | _[SecretSource](#secretsource)_ | Cert is the TLS certificate data to use.<br/>Typically this will come from a file. |
 | |
| | `MinVersion` | _string_ | MinVersion is the minimal TLS version that is acceptable.<br/>E.g. Set to "TLS1.3" to select TLS version 1.3 |
 | |
| | `CipherSuites` | _[]string_ | CipherSuites is a list of TLS cipher suites that are allowed.<br/>E.g.:<br/>- TLS_RSA_WITH_RC4_128_SHA<br/>- TLS_RSA_WITH_AES_256_GCM_SHA384<br/>If not specified, the default Go safe cipher list is used.<br/>List of valid cipher suites can be found in the [crypto/tls documentation](https://pkg.go.dev/crypto/tls#pkg-constants). |
 | |
| 
 | |
| ### URLParameterRule
 | |
| 
 | |
| (**Appears on:** [LoginURLParameter](#loginurlparameter))
 | |
| 
 | |
| URLParameterRule represents a rule by which query parameters
 | |
| passed to the `/oauth2/start` endpoint are checked to determine whether
 | |
| they are valid overrides for the given parameter passed to the IdP's
 | |
| login URL.  Either Value or Pattern should be supplied, not both.
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `value` | _string_ | A Value rule matches just this specific value |
 | |
| | `pattern` | _string_ | A Pattern rule gives a regular expression that must be matched by<br/>some substring of the value.  The expression is _not_ automatically<br/>anchored to the start and end of the value, if you _want_ to restrict<br/>the whole parameter value you must anchor it yourself with `^` and `$`. |
 | |
| 
 | |
| ### Upstream
 | |
| 
 | |
| (**Appears on:** [UpstreamConfig](#upstreamconfig))
 | |
| 
 | |
| Upstream represents the configuration for an upstream server.
 | |
| Requests will be proxied to this upstream if the path matches the request path.
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `id` | _string_ | ID should be a unique identifier for the upstream.<br/>This value is required for all upstreams. |
 | |
| | `path` | _string_ | Path is used to map requests to the upstream server.<br/>The closest match will take precedence and all Paths must be unique.<br/>Path can also take a pattern when used with RewriteTarget.<br/>Path segments can be captured and matched using regular experessions.<br/>Eg:<br/>- `^/foo$`: Match only the explicit path `/foo`<br/>- `^/bar/$`: Match any path prefixed with `/bar/`<br/>- `^/baz/(.*)$`: Match any path prefixed with `/baz` and capture the remaining path for use with RewriteTarget |
 | |
| | `rewriteTarget` | _string_ | RewriteTarget allows users to rewrite the request path before it is sent to<br/>the upstream server (for an HTTP/HTTPS upstream) or mapped to the filesystem<br/>(for a `file:` upstream).<br/>Use the Path to capture segments for reuse within the rewrite target.<br/>Eg: With a Path of `^/baz/(.*)`, a RewriteTarget of `/foo/$1` would rewrite<br/>the request `/baz/abc/123` to `/foo/abc/123` before proxying to the<br/>upstream server.  Or if the upstream were `file:///app`, a request for<br/>`/baz/info.html` would return the contents of the file `/app/foo/info.html`. |
 | |
| | `uri` | _string_ | The URI of the upstream server. This may be an HTTP(S) server of a File<br/>based URL. It may include a path, in which case all requests will be served<br/>under that path.<br/>Eg:<br/>- http://localhost:8080<br/>- https://service.localhost<br/>- https://service.localhost/path<br/>- file://host/path<br/>If the URI's path is "/base" and the incoming request was for "/dir",<br/>the upstream request will be for "/base/dir". |
 | |
| | `insecureSkipTLSVerify` | _bool_ | InsecureSkipTLSVerify will skip TLS verification of upstream HTTPS hosts.<br/>This option is insecure and will allow potential Man-In-The-Middle attacks<br/>between OAuth2 Proxy and the upstream server.<br/>Defaults to false. |
 | |
| | `static` | _bool_ | Static will make all requests to this upstream have a static response.<br/>The response will have a body of "Authenticated" and a response code<br/>matching StaticCode.<br/>If StaticCode is not set, the response will return a 200 response. |
 | |
| | `staticCode` | _int_ | StaticCode determines the response code for the Static response.<br/>This option can only be used with Static enabled. |
 | |
| | `flushInterval` | _[Duration](#duration)_ | FlushInterval is the period between flushing the response buffer when<br/>streaming response from the upstream.<br/>Defaults to 1 second. |
 | |
| | `passHostHeader` | _bool_ | PassHostHeader determines whether the request host header should be proxied<br/>to the upstream server.<br/>Defaults to true. |
 | |
| | `proxyWebSockets` | _bool_ | ProxyWebSockets enables proxying of websockets to upstream servers<br/>Defaults to true. |
 | |
| | `timeout` | _[Duration](#duration)_ | Timeout is the maximum duration the server will wait for a response from the upstream server.<br/>Defaults to 30 seconds. |
 | |
| | `disableKeepAlives` | _bool_ | DisableKeepAlives disables HTTP keep-alive connections to the upstream server.<br/>Defaults to false. |
 | |
| 
 | |
| ### UpstreamConfig
 | |
| 
 | |
| (**Appears on:** [AlphaOptions](#alphaoptions))
 | |
| 
 | |
| UpstreamConfig is a collection of definitions for upstream servers.
 | |
| 
 | |
| | Field | Type | Description |
 | |
| | ----- | ---- | ----------- |
 | |
| | `proxyRawPath` | _bool_ | ProxyRawPath will pass the raw url path to upstream allowing for urls<br/>like: "/%2F/" which would otherwise be redirected to "/" |
 | |
| | `upstreams` | _[[]Upstream](#upstream)_ | Upstreams represents the configuration for the upstream servers.<br/>Requests will be proxied to this upstream if the path matches the request path. |
 |