-
Notifications
You must be signed in to change notification settings - Fork 186
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"claim not set or empty" when logging in from desktop clients #6403
Comments
I have been having the same issue since last update. In my case I use Authelia.
Hope this will work for you as well. BTW, I'm using this guide: |
@C8opmBM Thank you! That seems to have fixed it. Login works as expected again. I'm leaving this issue open, as I'd like this to be documented and/or fixed in the stable release as other users will run into the same issue. |
I think this should be checked, since the console now is spammed with error messages, even though the login works. I'm getting
|
It seems I am assigned as a normal user. Will look more into this, if someone could help, that'd be awesome :) |
I'm seeing the same logs.
I'm the only user - admin. |
Yes, your name is admin, but you are regular user. Check if you have access to anything but your profile. Keep this open, maybe we'll get a fix or a solution for Authelia. Meanwhile, I will revert to 3.0.0-rc.3 which does not exhibit this behaviour. |
@seriousm4x @C8opmBM between rc3 and rc4 we needed to change defaults for To get back the rc3 behavior setting |
@rhafer thank you, that fixed everything. |
@rhafer forgot to ask, since you recommended a workaround to have the earlier behaviour, should this affect the future releases? In case we want the current behaviour (owncloudUUID for computing the sub claim) is there any documentation on how to achieve that? |
IIUC you're not using the builtin IDP, but some external one (authelia?) right? In that case, as long as you explicitly set
That change ("use owncloudUUID for computing the sub claim") was specific to our builtin idp (lico). We can't influence how external IDPs compute the sub claim. The problematic change for setups using external IDPs were the changed defaults for But we need to revert that part of the change now anyway, since it is triggering an issue in lico, which causes the desktop client to no longer work. (#6415)
We definitely need to add more documentation on how to properly integrate with external IDPs. |
Describe the bug
I can't login from desktop clients anymore. When trying to login, the client app shows
"Authentication process failed. Do you want to retry and start over?"
Ocis logs the following error:
I'm using ocis 3.0.0-rc.4. Both Windows and Linux clients use the latest version 4.0.0.
Using the web interface works just fine.
Steps to reproduce
Steps to reproduce the behavior:
Also completely removing the account from the client and re-adding won't work either.
Expected behavior
Login succeeds
Actual behavior
Ocis throws error caused by this line:
ocis/services/proxy/pkg/middleware/account_resolver.go
Line 63 in 0972955
Setup
I'm using docker on unraid. This is my compose file:
Additional context
I'm also not able to login from my iPhone anymore. When I try to do so, server logs are getting spamed non stop with error logs:
The text was updated successfully, but these errors were encountered: