Open
Description
Right now, the server supports two different auth modes, confusingly named auth: "tls"
and auth: "oidc"
, even though that doesn't cover exactly what they do. The main problem is that this one setting gives the impression that both methods are mutually exclusive, whereas they are not.
Discussions such as #667, #671, nodeSolidServer/solid-auth-client#44, solid/solid#138, nodeSolidServer/oidc-auth-manager#20 show that there is a need for more clarity, and a better configuration option.
This issue tracks general progress and will act as a tracker for multiple sub-issues.
Here are the steps we need to take in my opinion:
- Have one single contract for the entire node-solid-server to track a) the WebID of the logged-in agent b) the method through which that agents has logged in
- Document the above contract
- Ensure that “ask for a client certificate on every resource (WebID-TLS)” can be enabled and disabled independently of other features
- Ensure that “act as an OIDC identity provider” can be enabled and disabled independently of other features
- Ensure that “log in with OIDC through username/password” can be enabled and disabled independently of other features
- Ensure that “log in with OIDC through client certificates (WebID-TLS)” can be enabled and disabled independently of other features
- Ensure that “accept bearer tokens” can be enabled and disabled independently of other features
- Examine whether we want to always translate successful logins into an Express cookie-based session
- Examine whether we want to allow turning on or off cookie-based sessions
- Create a configuration section that allows to enable and disable all of the above options independently
- Update the
init
generator to create the right config - Remove the old
auth
config section
Feedback welcome.