-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support setting X-Forwarded-* headers #16
Comments
@mfulgo Let's chat about this use case a little more on this issue. How much are you tweaking the response bodies when proxying the requests? Is it a straight proxy, or are you supporting a migration scenario ? |
/authn
api)
It's not a straight proxy: I'm expecting to drop the links and some other fields from the responses, as I expect the client application to know and follow a certain flow, and I don't want to expose the Okta endpoint URL. I also need to do some custom validation of phone numbers used for SMS factors, which is one of the primary reasons for doing the proxy. |
Thanks! that helps! |
/authn
api)
Any update here? I've looked through the docs and library and sadly it looks like I'd have to hack the inner-guts to send a X-Forwarded-* header (which is not easily feasible and comes with a host of its own problems). Appreciate your hard work on this library and any updates you have to share. |
Nothing yet, what are you currently doing? maybe we can provide another option? |
Thanks, @bdemers! |
Thank you @bdemers !! |
Based on comments from #13 and #14 from @mfulgo
Setting a
X-Forwarded-For
header is required for this scenario.(comments welcome)
The text was updated successfully, but these errors were encountered: