Describe the bug
UI sign-in button doesn't do anything when using a configured OIDC auth method (tested with Okta)
To Reproduce
Steps to reproduce the behavior:
Expected behavior
Logging in successfully.
Environment:
vault status): 1.5.4vault version): 1.5.5Vault server configuration file(s):
ui = true
listener "tcp" {
address = "[::]:8200"
cluster_address = "[::]:8201"
tls_cert_file = "/etc/pki/tls.crt"
tls_key_file = "/etc/pki/tls.key"
}
storage "gcs" {
bucket = "my-gcs-bucket"
ha_enabled = "true"
}
service_registration "kubernetes" {}
Additional context
Using the CLI to log in with said auth method works perfectly using the following command:
vault login -method=oidc -path=my_okta_oidc role=my_role
Same issue with Azure. Running Vault 1.5.4
Hi folks, I'm not able to reproduce this issue, so I wonder if you've double-checked the redirect_urls in your oidc config, and also if there's anything being logged on the vault side? You also may want to test a different web browser too, in case there's an extension blocking something.
Hey @tvoran - good call - I had an extra / in my URL. Got it working now!
@NightmareCinema So in trying this some more, I found that if the default_role was set to a non-existent vault role, then I get the behavior you describe. Wondering if that is what's happening in your case?
Hi folks, I'm not able to reproduce this issue, so I wonder if you've double-checked the redirect_urls in your oidc config, and also if there's anything being logged on the vault side? You also may want to test a different web browser too, in case there's an extension blocking something.
That was it. I had a mismatch in my allowed redirect urls caused by my port number. Now everything is truly identical and works smoothly! Many thanks!
Most helpful comment
Hey @tvoran - good call - I had an extra / in my URL. Got it working now!