I’m trying to login to the mobile app with OIDC, but I’m running into this error after pressing Login with Frontend and authorizing the app from Authelia.
I’m not using the mobile application, but I see 2 login buttons in the screenshot:
Login
Login with Frontend
I guess one is for local auth and the other is for OIDC.
According to your configuration, you have the local authentication disabled. Maybe the button Login with Frontend is for local authentication?
Ok. I have the same configuration for integration with Authelia and it’s working fine in a web browser. So I guess it’s more an issue related to mobile app. I need to try.
Depending on how Authelia is setup, you may try ^/api/.* in Unauthorized Paths or similiar. I have to do this for my Firefly iii abacus app through Authentik.
this is a common issue with a lot of third party apps, if this doesn’t work try removing the ^ (i.e. /api/.*Be sure to include the period as this is using Regex
I just downloaded the latest release and tested the flow through Authentik.
I tested and was able to duplicate your error with Authentik, so I added my first suggestion to Unauthorized Paths with the same outcome.
I can confirm working order with the following:
under Advanced protocol settings go to Unauthorized Paths and enter :
/api/.*
I am also using Nginx Proxy Manager with a custom Advanced Settings setup. I can make a full post about this if it would be helpful.
Yep! Your config looks similar to mine. Just use the Login with Frontend option, this redirected me to Authentik then to my frontend, which has mylogin with authentik button, which then obtains and passes creds to the app. Seems a bit repetitive at first, but makes sense being that it’s a custom frontend.
Tip if you use a security key for securing your provider, you will need to setup TOTP as well, the app doesn’t seem to pass the approval for my yubikey.
Posting from mobile(iOS) so apologies don’t have screenshots to share currently for better explanation.
This is what I ended up with in my Authelia configuration file:
access_control:
default_policy: deny
rules:
- domain: tasks.example.com
policy: bypass
resources:
- /api.*
# This one has to go second, so it doesn't override the first rule
- domain: '*.example.com'
policy: one_factor