[Bug 1959722] Re: [MIR] libapache2-mod-auth-openidc
Christian Ehrhardt
1959722 at bugs.launchpad.net
Tue Jun 13 14:51:12 UTC 2023
There has been not further update for too long, for now we consider it invalid.
Feel free to re-open if there is effort backing it up and motivation to bring it to main.
** Changed in: libapache2-mod-auth-openidc (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Ubuntu
OpenStack, which is subscribed to libapache2-mod-auth-openidc in Ubuntu.
https://bugs.launchpad.net/bugs/1959722
Title:
[MIR] libapache2-mod-auth-openidc
Status in libapache2-mod-auth-openidc package in Ubuntu:
Invalid
Bug description:
[Availability]
Currently in universe
[Rationale]
Keystone is an OpenStack project that we're aready support in main.
apache2 is also in main. libapache2-mod-auth-openidc will be used
in conjunction with keystone and apache2 to provide federated
authorization/authentication.
[Security]
https://ubuntu.com/security/cves?q=&package=libapache2-mod-auth-openidc&priority=&version=&status=
It appears these are all patched in the version that is in jammy.
[Quality Assurance]
Package works out of the box with no prompting. There are no major bugs
in Ubuntu and there are no major bugs in Debian. Tests are run during
build.
[Dependencies]
All are in main
[Standards Compliance]
FHS and Debian Policy compliant
[Maintenance]
Package that the OpenStack Team will take care of
[Background]
The libapache2-mod-auth-openidc package provides the mod_auth_openidc
authentication/authorization module for Apache2. It enables an Apache2
web server to operate as an OpenID Connect Relying Party towards an
OpenID Connect Provider, relaying user authentication to a provider
nad receiving user identity information from that provider, then
passes that identity information on to applications protected by the
Apache web server and establishes an authentication session for the
identified user.
The current use case for libapache2-mod-auth-openidc will be for
OpenStack Keystone federation. This allows users to authenticate
directly with another identity source and then provide keystone with
a set of user attributes, useful for organizations that already have
a primary identity source, preventing the need for a separate set of
cloud credentials.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libapache2-mod-auth-openidc/+bug/1959722/+subscriptions
More information about the Ubuntu-openstack-bugs
mailing list