HTTPS Required for .well-known/openid-configuration #152
-
I'm am experiencing the exact same issue as laid out in #76 with a solution apparently present in #77, but I am not sure what that solution was/is. Is this not a typical issue to be running into? Details in the fix would be appreciated, but I'm open to comments on how the configuration should be avoided entirely as well. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 7 replies
-
This is not a typical issue to be running into. This usually means that your authentication provider is running over HTTP and not HTTPS (pretty insecure). Unless if this is for development, auth providers should be using HTTPS. |
Beta Was this translation helpful? Give feedback.
-
My auth provider in this case is Authentik, running on a different machine but still on my local network. My ISP does not allow BYOD, and the provided one does not support NAT hairpinning/loopback addresses, so https://auth.domain.tld/application/o/jellyfin/.well-known/openid-configuration doesn't resolve for me. http://lan.ip.of.auth:9000/application/o/jellyfin/.well-known/openid-configuration does load as expected. |
Beta Was this translation helpful? Give feedback.
In that case, you need to either use IPv6 (best solution) or set up split-horizon DNS (bad solution).