feedbacks: Remove (enterprise) Entra-itis, version banner

This commit is contained in:
Michael Farrell 2025-02-20 16:31:51 +10:00
parent 4114ecc987
commit a0c5d98400

View file

@ -458,10 +458,6 @@ Each client has unique signing keys and access secrets, so this is limited to ea
## WebFinger ## WebFinger
> [!NOTE]
>
> WebFinger support requires Kanidm v1.5.1 or later.
[WebFinger](https://datatracker.ietf.org/doc/html/rfc7033) provides a mechanism [WebFinger](https://datatracker.ietf.org/doc/html/rfc7033) provides a mechanism
for discovering information about entities at a well-known URL for discovering information about entities at a well-known URL
(`http://example.com/.well-known/webfinger`). (`http://example.com/.well-known/webfinger`).
@ -475,10 +471,10 @@ Kanidm v1.5.1 and later can respond to WebFinger requests, using a user's SPN as
the account (eg: `user@idm.example.com`). This *does not* match on email the account (eg: `user@idm.example.com`). This *does not* match on email
addresses, because they are not required by Kanidm nor guaranteed to be unique. addresses, because they are not required by Kanidm nor guaranteed to be unique.
When setting up an (enterprise) application to authenticate with Kanidm, When setting up an application to authenticate with Kanidm, WebFinger **does not
WebFinger **does not add any security** over configuring an OpenID Discovery add any security** over configuring an OpenID Discovery URL directly. In an OIDC
URL directly. In an OIDC context, the specification makes a number of flawed context, the specification makes a number of flawed assumptions which make it
assumptions which make it difficult to use with Kanidm: difficult to use with Kanidm:
* WebFinger assumes that the identity provider will give the same `iss` * WebFinger assumes that the identity provider will give the same `iss`
(issuer) and OpenID Discovery document, including all URLs and signing keys, (issuer) and OpenID Discovery document, including all URLs and signing keys,
@ -530,6 +526,6 @@ assumptions which make it difficult to use with Kanidm:
parameter, your load balancer will need to merge JSON responses from Kanidm parameter, your load balancer will need to merge JSON responses from Kanidm
and the other service(s). and the other service(s).
Because of these issues, we recommend that (enterprise) applications support Because of these issues, we recommend that applications support *directly*
*directly* configuring OIDC using a Discovery URL or OAuth 2.0 Authorisation configuring OIDC using a Discovery URL or OAuth 2.0 Authorisation Server
Server Metadata URL instead of WebFinger. Metadata URL instead of WebFinger.