mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.6K
active users

#oidc

1 post1 participant0 posts today
damienbod<p>Blogged: Use EdDSA signatures to validate tokens in ASP.NET Core using OpenID Connect</p><p><a href="https://damienbod.com/2025/08/06/use-eddsa-signatures-to-validate-tokens-in-asp-net-core-using-openid-connect/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">damienbod.com/2025/08/06/use-e</span><span class="invisible">ddsa-signatures-to-validate-tokens-in-asp-net-core-using-openid-connect/</span></a></p><p><a href="https://mastodon.social/tags/openid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openid</span></a> <a href="https://mastodon.social/tags/openidconnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openidconnect</span></a> <a href="https://mastodon.social/tags/oidc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oidc</span></a> <a href="https://mastodon.social/tags/identity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>identity</span></a> <a href="https://mastodon.social/tags/eddsa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eddsa</span></a> <a href="https://mastodon.social/tags/jwt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jwt</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/oauth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oauth</span></a></p>
Andi Barth<p>Is there a good way to authenticate users as role users in <a href="https://muenchen.social/tags/oidc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oidc</span></a>? (Situation: users authenticate in <a href="https://muenchen.social/tags/keycloak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keycloak</span></a>. For some extern apps we have role accounts (like press@organization), and certain non-admin users should use the external service with that account and not their own. Is there an easy way? Or do I just hold it wrong?)</p>
Ludovic :Firefox: :FreeBSD:<p>I'd like to follow some trainings on SAML/OIDC, understand how these things work, how they should be setup. Any recomendations?</p><p><a href="https://piaille.fr/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://piaille.fr/tags/oidc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oidc</span></a> <a href="https://piaille.fr/tags/saml" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>saml</span></a> <a href="https://piaille.fr/tags/training" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>training</span></a></p>
Joy Aliza Denebeim<p>I'm trying to configure mastodon for doing SSO with an authentik id. I'm getting "unknown encryption algorithm" </p><p>Has anyone else seen this or can you shed some light on what I'm trying to do?</p><p><a href="https://mastodon.social/tags/mastodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mastodon</span></a> <a href="https://mastodon.social/tags/Oidc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Oidc</span></a> <a href="https://mastodon.social/tags/sso" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sso</span></a> <a href="https://mastodon.social/tags/selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosting</span></a> <a href="https://mastodon.social/tags/authentik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentik</span></a> <a href="https://mastodon.social/tags/oauth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oauth</span></a></p>
BLACKVOID ⚫️<p>Correction! My favorite feature is mobile hoarding with <a href="https://mastodon.social/tags/ios" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ios</span></a> default stack menu offering the KaraKeep app. Effectily one button addition via a mobile device (my most often used scenario).</p><p>Feels like I just crawled from under a rock 😂</p><p><a href="https://mastodon.social/tags/Karakeep" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Karakeep</span></a> <a href="https://mastodon.social/tags/OIDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OIDC</span></a> <a href="https://mastodon.social/tags/PocketID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PocketID</span></a> <a href="https://mastodon.social/tags/apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apple</span></a> <a href="https://mastodon.social/tags/ios" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ios</span></a> <a href="https://mastodon.social/tags/openai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openai</span></a> <a href="https://mastodon.social/tags/selfhost" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhost</span></a> <a href="https://mastodon.social/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a> <a href="https://mastodon.social/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>
BLACKVOID ⚫️<p>While I never adopted the usage of "link bookmark" manager, decided to give <a href="https://mastodon.social/tags/Karakeep" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Karakeep</span></a> a go. </p><p>With <a href="https://mastodon.social/tags/OIDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OIDC</span></a> support (via <a href="https://mastodon.social/tags/PocketID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PocketID</span></a>), its a breeze to log in. </p><p>Search is brutally fast, and <a href="https://mastodon.social/tags/apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apple</span></a> <a href="https://mastodon.social/tags/ios" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ios</span></a> app is a welcome addition indeed. <a href="https://mastodon.social/tags/openai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openai</span></a> tag generation is my favorite feature so far.</p><p><a href="https://mastodon.social/tags/selfhost" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhost</span></a> <a href="https://mastodon.social/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a> <a href="https://mastodon.social/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>
Nik | Klampfradler 🎸🚲<p>I got back to <a href="https://toot.teckids.org/tags/WebIDAMd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebIDAMd</span></a>, a <a href="https://toot.teckids.org/tags/systemd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemd</span></a>-userdbd-based system for using <a href="https://toot.teckids.org/tags/OAuth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OAuth</span></a> / <a href="https://toot.teckids.org/tags/OIDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OIDC</span></a> / <a href="https://toot.teckids.org/tags/REST" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>REST</span></a> identity providers for <a href="https://toot.teckids.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> system authentication.</p><p>And I can now show off a first demo (no <a href="https://toot.teckids.org/tags/PAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PAM</span></a> authentication yet, but user and group listing):</p><p><a href="https://asciinema.org/a/728567" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">asciinema.org/a/728567</span><span class="invisible"></span></a></p><p>In contrast to <a href="https://toot.teckids.org/tags/sssd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sssd</span></a>'s recent OIDC module, WebIDAMd is fully provider-agnostic and integrates transparently with userdbd, the current/upcoming standard in most Linux distributions instead of requiring a full separate software stack.</p>
Elias Probst<p><span class="h-card" translate="no"><a href="https://gruene.social/@Gerbsen" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Gerbsen</span></a></span> es gibt einen Fork von <a href="https://mastodon.social/tags/Vaultwarden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vaultwarden</span></a> mit <a href="https://mastodon.social/tags/OIDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OIDC</span></a>-Support, aber der Maintainer hat gerade erst seinen Hauptsponsor verloren, weshalb zwar der Fork weiter maintained wird, aber die Releases evtl. immer etwas hinter dem Original hinterherhinken:<br><a href="https://github.com/dani-garcia/vaultwarden/pull/3899" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/dani-garcia/vaultwa</span><span class="invisible">rden/pull/3899</span></a></p>
Silke Meyer<p>Für "Identity Broker"-Szenarien mit Keycloak finde ich die Doku von Red Hat empfehlenswert. Dort ist verhältnismäßig gut beschrieben, wie man das Durchreichen von Claims/Attributen von einem Identity Provider durch einen anderen zu einem Client konfiguriert.</p><p><a href="https://docs.redhat.com/en/documentation/red_hat_build_of_keycloak/26.0/html/server_administration_guide/identity_broker" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.redhat.com/en/documentati</span><span class="invisible">on/red_hat_build_of_keycloak/26.0/html/server_administration_guide/identity_broker</span></a></p><p><a href="https://univention.social/tags/keycloak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keycloak</span></a> <a href="https://univention.social/tags/singlesignon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>singlesignon</span></a> <a href="https://univention.social/tags/iam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iam</span></a> <a href="https://univention.social/tags/oidc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oidc</span></a> <a href="https://univention.social/tags/saml" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>saml</span></a></p>
|7eter l-|. l3oling 🧰<p>Ann: Launched Open Collective for Ruby OAuth gems (oauth, oauth2, &amp; others)</p><p>I've been the primary maintainer of OAuth tools in Ruby since 2017. In this move toward supporting myself with open source work I need your help!<br><a href="https://opencollective.com/ruby-oauth" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">opencollective.com/ruby-oauth</span><span class="invisible"></span></a> <a href="https://ruby.social/tags/Ruby" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ruby</span></a> <a href="https://ruby.social/tags/OAuth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OAuth</span></a> <a href="https://ruby.social/tags/Authorization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authorization</span></a> <a href="https://ruby.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://ruby.social/tags/OIDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OIDC</span></a></p>
Gauff 🇪🇺<p><span class="h-card" translate="no"><a href="https://fosstodon.org/@adingbatponder" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>adingbatponder</span></a></span> If possible, setup <a href="https://piaille.fr/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> yourself, there are some very good guides: <a href="https://docs.pi-hole.net/guides/vpn/wireguard/server/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.pi-hole.net/guides/vpn/wi</span><span class="invisible">reguard/server/</span></a></p><p>If you really wish to use <a href="https://piaille.fr/tags/tailscale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tailscale</span></a> , I believe they offer the feature to have a <a href="https://piaille.fr/tags/passkey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passkey</span></a> , or <a href="https://piaille.fr/tags/OIDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OIDC</span></a> ?</p>
Sven Jacobs :androidHead:<p>I released version 0.3.0 of <a href="https://androiddev.social/tags/Lokksmith" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lokksmith</span></a> (<a href="https://androiddev.social/tags/OIDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OIDC</span></a> client) which now supports <a href="https://androiddev.social/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> and <a href="https://androiddev.social/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> via <a href="https://androiddev.social/tags/ComposeMultiplatform" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComposeMultiplatform</span></a>!</p><p><a href="https://github.com/svenjacobs/lokksmith/releases/tag/v0.3.0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/svenjacobs/lokksmit</span><span class="invisible">h/releases/tag/v0.3.0</span></a></p><p><a href="https://androiddev.social/tags/Kotlin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kotlin</span></a> <a href="https://androiddev.social/tags/KotlinMultiplatform" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KotlinMultiplatform</span></a> <a href="https://androiddev.social/tags/KMP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KMP</span></a> <a href="https://androiddev.social/tags/Compose" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Compose</span></a> <a href="https://androiddev.social/tags/JetpackCompose" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JetpackCompose</span></a> <a href="https://androiddev.social/tags/OAuth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OAuth</span></a> <a href="https://androiddev.social/tags/OpenIDConnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenIDConnect</span></a></p>
Makary<p>So, since I need <a href="https://gts.makary.online/tags/mobilizon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mobilizon</span></a> to use <em>only</em> my external <a href="https://gts.makary.online/tags/authentik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentik</span></a> for user base, I think I'll try to set it up via <a href="https://gts.makary.online/tags/ldap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LDAP</span></a> instead of <a href="https://gts.makary.online/tags/oidc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OIDC</span></a>, since when OIDC is plugged in, it still offers it's own login form, and that's not something I like or want, fingers crossed</p>
Lucas Janin 🇨🇦🇫🇷<p>Hey <a href="https://mastodon.social/tags/pocketid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pocketid</span></a> users!</p><p>I submitted 2 feature requests on GitHub for Pocket-ID. Feel free to upvote them if you find them useful :-)</p><p>🚀 Feature: Approximate Location Recognizes Local IPv6 as LAN, Internal Network<br><a href="https://github.com/pocket-id/pocket-id/issues/634" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/pocket-id/pocket-id</span><span class="invisible">/issues/634</span></a></p><p>🚀 Feature: Global Audit Log Adds a Local Traffic Filter<br><a href="https://github.com/pocket-id/pocket-id/issues/635" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/pocket-id/pocket-id</span><span class="invisible">/issues/635</span></a></p><p>Thanks</p><p><a href="https://mastodon.social/tags/OIDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OIDC</span></a> <a href="https://mastodon.social/tags/SSO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSO</span></a> <a href="https://mastodon.social/tags/passkey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passkey</span></a> <a href="https://mastodon.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ipv6</span></a> <a href="https://mastodon.social/tags/selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosting</span></a> <a href="https://mastodon.social/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Pocket ID is an OIDC provider simplifying authentication with passkeys. No passwords. Think secure logins using Yubikeys or biometrics. Lightweight compared to Keycloak or Hydra and ideal for focused use cases. Built for Docker setups. <a href="https://infosec.exchange/tags/Passkeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passkeys</span></a> <a href="https://infosec.exchange/tags/OIDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OIDC</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/pocket-id/pocket-id" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/pocket-id/pocket-id</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
BLACKVOID ⚫️<p>New blog post: <br>Looking for a <a href="https://mastodon.social/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a> <a href="https://mastodon.social/tags/OIDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OIDC</span></a> solution that's <a href="https://mastodon.social/tags/passkey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passkey</span></a> compatible and integrates with <a href="https://mastodon.social/tags/Synology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Synology</span></a> <a href="https://mastodon.social/tags/DSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DSM</span></a> <a href="https://mastodon.social/tags/SSO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSO</span></a>? Pocket ID is the answer.</p><p><a href="https://www.blackvoid.club/pocket-id-passkey-oidc-provider/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">blackvoid.club/pocket-id-passk</span><span class="invisible">ey-oidc-provider/</span></a></p>
Lucas Janin 🇨🇦🇫🇷<p>I love <a href="https://mastodon.social/tags/PocketID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PocketID</span></a>, a light weight <a href="https://mastodon.social/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a> <a href="https://mastodon.social/tags/OIDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OIDC</span></a> using only <a href="https://mastodon.social/tags/Passkey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passkey</span></a>. </p><p>After using it for several months with an LXC installation using Proxmox Helper Scripts, I noticed that the service runs as root. I also learned that a VM installation is more secure than an LXC. This article will guide you through installing Pocket-ID as a non-root service on Debian. Additionally, there's an upgrade script included.</p><p><a href="https://mastodon.social/tags/Proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxmox</span></a> <a href="https://mastodon.social/tags/debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debian</span></a> <a href="https://mastodon.social/tags/selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosting</span></a> <a href="https://mastodon.social/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.social/tags/openID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openID</span></a> <a href="https://mastodon.social/tags/passkeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passkeys</span></a> <a href="https://mastodon.social/tags/SSO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSO</span></a></p><p><a href="https://www.lucasjanin.com/2025/06/02/pocket-id-bare-metal-installation-on-debian" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lucasjanin.com/2025/06/02/pock</span><span class="invisible">et-id-bare-metal-installation-on-debian</span></a></p>
Lucas Janin 🇨🇦🇫🇷<p>Après avoir utilisé <a href="https://mastodon.social/tags/PocketID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PocketID</span></a> pendant plusieurs mois avec une installation LXC via les Proxmox Helper Scripts, j'ai remarqué que le service s'exécute en tant que root. J'ai également appris qu'une VM est plus sécurisée qu'un LXC. Cet article vous guidera dans l'installation de PocketID en tant que service non root sur Debian. De plus, un script de mise à niveau est inclus.</p><p><a href="https://mastodon.social/tags/Proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxmox</span></a> <a href="https://mastodon.social/tags/debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debian</span></a> <a href="https://mastodon.social/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a> <a href="https://mastodon.social/tags/selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosting</span></a> <a href="https://mastodon.social/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.social/tags/OIDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OIDC</span></a> <a href="https://mastodon.social/tags/openID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openID</span></a> <a href="https://mastodon.social/tags/passkey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passkey</span></a> <a href="https://mastodon.social/tags/passkeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passkeys</span></a> <a href="https://mastodon.social/tags/SSO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSO</span></a></p><p><a href="https://www.lucasjanin.com/2025/06/02/pocket-id-installation-bare-metal-sur-debian/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lucasjanin.com/2025/06/02/pock</span><span class="invisible">et-id-installation-bare-metal-sur-debian/</span></a></p>
damienbod<p>Blogged: Handling OpenID Connect error events in ASP.NET Core</p><p><a href="https://damienbod.com/2025/06/02/handling-openid-connect-error-events-in-asp-net-core/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">damienbod.com/2025/06/02/handl</span><span class="invisible">ing-openid-connect-error-events-in-asp-net-core/</span></a></p><p><a href="https://mastodon.social/tags/aspnetcore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aspnetcore</span></a> <a href="https://mastodon.social/tags/dotnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dotnet</span></a> <a href="https://mastodon.social/tags/identity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>identity</span></a> <a href="https://mastodon.social/tags/openidconnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openidconnect</span></a> <a href="https://mastodon.social/tags/oauth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oauth</span></a> <a href="https://mastodon.social/tags/oidc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oidc</span></a> <a href="https://mastodon.social/tags/iam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iam</span></a></p>
Matthew Slowe<p>New blog post by a colleague: Will quantum computing topple SAML?</p><p><a href="https://trustandidentity.jiscinvolve.org/wp/2025/05/16/will-quantum-computing-topple-saml/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">trustandidentity.jiscinvolve.o</span><span class="invisible">rg/wp/2025/05/16/will-quantum-computing-topple-saml/</span></a></p><p><a href="https://infosec.exchange/tags/saml" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>saml</span></a> <a href="https://infosec.exchange/tags/sso" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sso</span></a> <a href="https://infosec.exchange/tags/pqc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pqc</span></a> <a href="https://infosec.exchange/tags/quantumcomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quantumcomputing</span></a> <a href="https://infosec.exchange/tags/oidc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oidc</span></a> <a href="https://infosec.exchange/tags/jisc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jisc</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/iam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iam</span></a> <a href="https://infosec.exchange/tags/aim" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aim</span></a> <a href="https://infosec.exchange/tags/edugain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>edugain</span></a></p>