Results 24 comments of H2CK

When using the scope `profile` the claim `picture` could be added, which contains the profile photo.

According to the OIDC standard the claim `picture` is used. The claim contains URL from where the avatar image can be downloaded. The current implementation in the referenced branch provides...

Version 0.7.0 will be released in the next days. As alternative solution I try to investigate to use real urls provided by the Nextcloud instance.

I have never seen such a problem before with the wellknown endpoint. I verified at my own live installation: Here everything is fine. Could you provide an example of the...

There is nothing special the oidc app is doing here. It just generates a JSON response (without the backslashes) and the Nextcloud core is performing a json_encode on the JSONResponse...

Currently there is no fixed timeline for this feature. I will investigate possible solution options in the next days.

Short intermediate feedback: Since Nextclouds authentication mechanism is defined very strictly in the core module, it is not sufficient to just receive the JWT, perform validations on the JWT (signature,...

Sorry for the late reply. Currently there is no timeline since there is no simple solution. And currently no implementation planned. Current status is: Nextclouds authentication mechanisms rely on username/password...

Currently the oidc app only uses the Nextcloud groups. Nevertheless the LDAP groups (even those that are not mapped to a Nextcloud group) can be found in the accounts section...

During the last weeks I did some further investigation on this topic. The oidc app strictly relies on the [API provided by Nextcloud to access the groups](https://nextcloud-server.netlify.app/classes/ocp-igroupmanager). Nevertheless if you...