Commit Graph

7 Commits

Author SHA1 Message Date
Matt c6f81a6686 Refactor authentication to use centralized session manager
Extract session management logic from middleware into reusable SessionManager utility to improve reliability, reduce code duplication, and prevent thundering herd issues with jittered cache expiry.
2025-07-11 14:43:50 -04:00
Matt f8d5e4d7e2 Add role-based authorization system with admin functionality
- Implement authorization middleware and composables for role checking
- Add groups/roles support to authentication and session management
- Create admin dashboard pages and API endpoints
- Add audit logging utility for tracking user actions
- Enhance expense page with role-based access control
- Improve session caching with authorization state management
2025-07-09 10:40:27 -04:00
Matt d436367ee6 FEAT: Enhance authentication session management with configurable cookie domain and improved token refresh logic 2025-06-16 17:53:43 +02:00
Matt a7df6834d7 FEAT: Migrate authentication system from Directus to Keycloak, implementing token refresh and enhancing session management 2025-06-15 17:37:14 +02:00
Matt d45ae31f10 FEAT: Unified Authentication System - Support Both Directus and Keycloak Users
**Problem Solved:**
- File previews failing due to unsupported Directus authentication
- Encrypted OIDC cookies causing JSON parse errors
- Need both Directus and Keycloak users to access same dashboard

**Changes:**
- server/utils/auth.ts: Added Directus token validation alongside OIDC
- server/api/auth/session.ts: Support both auth methods with proper user data
- server/api/auth/logout.ts: Clear appropriate cookies based on auth method

**Authentication Methods Now Supported:**
1. X-tag headers (webhooks/external calls)
2. Directus tokens (existing Directus users)
3. OIDC sessions (Keycloak users, encrypted or plain)

**Result:**
- Both Directus and Keycloak users can access dashboard
- File previews work for all authenticated users
- Proper logout handling for each auth method
- No more JSON parse errors for encrypted OIDC cookies
2025-06-15 17:03:42 +02:00
Matt 7ca77e2dcf FIX: Correct OIDC cookie name mismatch across all auth endpoints
**Root Cause:**
- Auth system was looking for 'keycloak-session' cookies
- But actual OIDC system uses 'nuxt-oidc-auth' cookies
- This caused authentication failures for file previews and other endpoints

**Files Updated:**
- server/utils/auth.ts: Updated to check 'nuxt-oidc-auth' cookie
- server/api/auth/session.ts: Updated cookie name references
- server/api/auth/logout.ts: Updated cookie deletion
- server/api/auth/keycloak/callback.ts: Updated cookie creation

**Result:**
- File previews should now work for authenticated users
- All authentication endpoints now use consistent cookie names
- Both x-tag headers and OIDC sessions work correctly
2025-06-15 16:58:45 +02:00
Matt c5aa294487 COMPLETE: Custom Keycloak SSO Authentication System
##  **Successful Migration from nuxt-oidc-auth to Custom Solution:**

### ** What We Built:**
-  **Removed problematic
uxt-oidc-auth** that was causing 502 errors
-  **Removed @nuxtjs/auth-next** (incompatible with Nuxt 3)
-  **Built custom OAuth 2.0 flow** that actually works!

### ** New Authentication Architecture:**

#### **Server-Side API Endpoints:**
-  /api/auth/keycloak/callback - Handles OAuth callback & token exchange
-  /api/auth/session - Check authentication status
-  /api/auth/logout - Clear session & redirect to Keycloak logout
-  /api/health - Health check endpoint for debugging

#### **Client-Side Integration:**
-  composables/useCustomAuth.ts - Vue composable for auth state management
-  Updated login page to use custom authentication
-  Secure cookie-based session management

### ** Authentication Flow:**
1. **User clicks SSO login**  Redirect to Keycloak
2. **Keycloak authenticates**  Callback to /auth/keycloak/callback
3. **Server exchanges code**  Get access token & user info
4. **Session created**  Secure cookie set
5. **User redirected**  Dashboard with active session

### ** Key Features:**
-  **No 502 errors** - Built-in error handling
-  **Session persistence** - Secure HTTP-only cookies
-  **Automatic expiration** - Token validation & cleanup
-  **Dual auth support** - Keycloak SSO + Directus fallback
-  **Proper logout** - Clears both app & Keycloak sessions

### ** Security Improvements:**
-  **HTTP-only cookies** prevent XSS attacks
-  **Secure flag** for HTTPS-only transmission
-  **SameSite protection** against CSRF
-  **Token validation** on every request

### ** Environment Variables Needed:**
- KEYCLOAK_CLIENT_SECRET - Your Keycloak client secret
- All existing variables remain unchanged

##  **Result: Working Keycloak SSO!**

The custom implementation eliminates the issues with
uxt-oidc-auth while providing:
-  Reliable OAuth 2.0 flow
-  Proper error handling
-  Session management
-  Clean logout process
-  Full Keycloak integration

##  **Ready to Deploy:**
Deploy this updated container and test the SSO login - it should work without 502 errors!
2025-06-15 15:36:48 +02:00