OpenId integration problem with keycloak. "Failed to discover OpenID provider: Request failed" #6785
Replies: 3 comments
-
|
Vaultwarden seems to be unable to connect to the FQDN/IP. # Via OpenSSL
docker exec -it vaultwarden openssl s_client -showcerts -connect ssoxxxx.local:443
# Via cURL
docker exec -it vaultwarden curl -v https://ssoxxxx.local |
Beta Was this translation helpful? Give feedback.
-
|
Thanks for your reply. I can see this error with openssl "verify error:num=19:self-signed certificate in certificate chain". But I think that it won't be a problem. root@xxxxxxx:~# docker exec -it vaultwarden openssl s_client -showcerts -connect sso.xxxx.local:443
|
Beta Was this translation helpful? Give feedback.
-
|
Sorry for waste your time. Certificado de la CA local para validación SSL interna
I was using the sso.xxxx.local certificste instead of root CA. Via OpenSSLdocker exec -it vaultwarden openssl s_client -showcerts -connect ssoxxxx.local:443 --> give me verify error:num=19:self-signed certificate in certificate chain error. Via cURLdocker exec -it vaultwarden curl -v https://ssoxxxx.local --> work fine Thanks and sorry |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Your environment (Generated via diagnostics page)
Config & Details (Generated via diagnostics page)
Show Config & Details
Environment settings which are overridden: DOMAIN, SIGNUPS_ALLOWED, INVITATIONS_ALLOWED, EMAIL_CHANGE_ALLOWED, ADMIN_TOKEN, SSO_ENABLED, SSO_ONLY, SSO_CLIENT_ID, SSO_CLIENT_SECRET, SSO_AUTHORITY, SMTP_HOST, SMTP_SECURITY, SMTP_PORT, SMTP_FROM, SMTP_FROM_NAME
Config:
{ "_duo_akey": null, "_enable_duo": true, "_enable_email_2fa": false, "_enable_smtp": true, "_enable_yubico": true, "_icon_service_csp": "", "_icon_service_url": "", "_ip_header_enabled": true, "_max_note_size": 10000, "_smtp_img_src": "***:", "admin_ratelimit_max_burst": 3, "admin_ratelimit_seconds": 300, "admin_session_lifetime": 20, "admin_token": "***", "allowed_connect_src": "", "allowed_iframe_ancestors": "", "attachments_folder": "data/attachments", "auth_request_purge_schedule": "30 * * * * *", "authenticator_disable_time_drift": false, "data_folder": "data", "database_conn_init": "", "database_idle_timeout": 600, "database_max_conns": 10, "database_min_conns": 2, "database_timeout": 30, "database_url": "***************", "db_connection_retries": 15, "disable_2fa_remember": false, "disable_admin_token": false, "disable_icon_download": false, "dns_prefer_ipv6": false, "domain": "*****://*******************", "domain_origin": "*****://*******************", "domain_path": "", "domain_set": true, "duo_context_purge_schedule": "30 * * * * *", "duo_host": null, "duo_ikey": null, "duo_skey": null, "duo_use_iframe": false, "email_2fa_auto_fallback": false, "email_2fa_enforce_on_verified_invite": false, "email_attempts_limit": 3, "email_change_allowed": true, "email_expiration_time": 600, "email_token_size": 6, "emergency_access_allowed": true, "emergency_notification_reminder_schedule": "0 3 * * * *", "emergency_request_timeout_schedule": "0 7 * * * *", "enable_db_wal": true, "enable_websocket": true, "enforce_single_org_with_reset_pw_policy": false, "event_cleanup_schedule": "0 10 0 * * *", "events_days_retain": null, "experimental_client_feature_flags": "", "extended_logging": true, "helo_name": null, "hibp_api_key": "***", "http_request_block_non_global_ips": true, "http_request_block_regex": null, "icon_blacklist_non_global_ips": true, "icon_blacklist_regex": null, "icon_cache_folder": "data/icon_cache", "icon_cache_negttl": 259200, "icon_cache_ttl": 2592000, "icon_download_timeout": 10, "icon_redirect_code": 302, "icon_service": "internal", "incomplete_2fa_schedule": "30 * * * * *", "incomplete_2fa_time_limit": 3, "increase_note_size_limit": false, "invitation_expiration_hours": 120, "invitation_org_name": "Vaultwarden", "invitations_allowed": true, "ip_header": "X-Real-IP", "job_poll_interval_ms": 30000, "log_file": null, "log_level": "debug", "log_timestamp_format": "%Y-%m-%d %H:%M:%S.%3f", "login_ratelimit_max_burst": 10, "login_ratelimit_seconds": 60, "org_attachment_limit": null, "org_creation_users": "", "org_events_enabled": false, "org_groups_enabled": false, "password_hints_allowed": true, "password_iterations": 600000, "purge_incomplete_sso_auth": "0 20 0 * * *", "push_enabled": false, "push_identity_uri": "https://identity.bitwarden.com", "push_installation_id": "***", "push_installation_key": "***", "push_relay_uri": "https://push.bitwarden.com", "reload_templates": false, "require_device_email": false, "rsa_key_filename": "data/rsa_key", "send_purge_schedule": "0 5 * * * *", "sendmail_command": null, "sends_allowed": true, "sends_folder": "data/sends", "show_password_hint": false, "signups_allowed": true, "signups_domains_whitelist": "", "signups_verify": false, "signups_verify_resend_limit": 6, "signups_verify_resend_time": 3600, "smtp_accept_invalid_certs": false, "smtp_accept_invalid_hostnames": false, "smtp_auth_mechanism": null, "smtp_debug": false, "smtp_embed_images": true, "smtp_explicit_tls": null, "smtp_from": "********************", "smtp_from_name": "********", "smtp_host": "******************", "smtp_password": null, "smtp_port": 25, "smtp_security": "off", "smtp_ssl": null, "smtp_timeout": 15, "smtp_username": null, "sso_allow_unknown_email_verification": false, "sso_audience_trusted": null, "sso_auth_only_not_session": false, "sso_authority": "*****://********************************", "sso_authorize_extra_params": "", "sso_callback_path": "*****://************************************************", "sso_client_cache_expiration": 2, "sso_client_id": "************", "sso_client_secret": "***", "sso_debug_tokens": false, "sso_enabled": true, "sso_master_password_policy": null, "sso_only": false, "sso_pkce": true, "sso_scopes": "openid email profile", "sso_signups_match_email": true, "templates_folder": "data/templates", "tmp_folder": "data/tmp", "trash_auto_delete_days": null, "trash_purge_schedule": "0 5 0 * * *", "use_sendmail": false, "use_syslog": false, "user_attachment_limit": null, "user_send_limit": null, "web_vault_enabled": true, "web_vault_folder": "web-vault/", "yubico_client_id": null, "yubico_secret_key": null, "yubico_server": null }I have deployed de server with docker. My nginx configuration
vaultwarden
::::::::::::::
server {
listen 80;
server_name vault.xxxx.local;
}
::::::::::::::
vaultwarden_ssl
::::::::::::::
server {
listen 443 ssl http2;
server_name vault.xxxx.local;
location / {
include /etc/nginx/proxy_params;
proxy_pass http://0.0.0.0:8085;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
# AÑADE ESTO:
proxy_set_header X-Forwarded-Proto https;
}
}
Admin portal is working fine. Vaulwarden is working fine without openid
Dcoker compose
version: '3'
services:
vaultwarden:
image: vaultwarden/server:latest
container_name: vaultwarden
restart: unless-stopped
When I tried to access with SSO I have this error
{
"message": "Failed to discover OpenID provider: Request failed",
"validationErrors": {
"": [
"Failed to discover OpenID provider: Request failed"
]
},
"errorModel": {
"message": "Failed to discover OpenID provider: Request failed",
"object": "error"
},
"error": "",
"error_description": "",
"exceptionMessage": null,
"exceptionStackTrace": null,
"innerExceptionMessage": null,
"object": "error"
}
And from the server
[2026-02-03 08:32:49.245][request][INFO] GET /
[2026-02-03 08:32:49.245][response][INFO] (web_index) GET / => 200 OK
[2026-02-03 08:32:49.800][request][INFO] GET /api/config
[2026-02-03 08:32:49.800][response][INFO] (config) GET /api/config => 200 OK
[2026-02-03 08:32:57.368][request][INFO] POST /api/organizations/domain/sso/verified
[2026-02-03 08:32:57.368][response][INFO] (get_org_domain_sso_verified) POST /api/organizations/domain/sso/verified => 200 OK
[2026-02-03 08:32:57.379][request][INFO] GET /identity/sso/prevalidate?domainHint=04c1dd89-b054-4cc0-
[2026-02-03 08:32:57.381][response][INFO] (prevalidate) GET /identity/sso/prevalidate => 200 OK
[2026-02-03 08:32:57.405][request][INFO] GET /identity/connect/authorize?client_id=web&redirect_uri=htt
[2026-02-03 08:32:57.421][reqwest::connect][DEBUG] starting new connection: https://ssoxxxx.local/
[2026-02-03 08:32:57.422][hyper_util::client::legacy::connect::http][DEBUG] connecting to 172.17.0.1:443
[2026-02-03 08:32:57.422][hyper_util::client::legacy::connect::http][DEBUG] connected to 172.17.0.1:443
[2026-02-03 08:32:57.423][vaultwarden::sso_client][ERROR] Failed to discover OpenID provider: Request failed
[2026-02-03 08:32:57.424][response][INFO] (authorize) GET /identity/connect/authorize?<data..> => 400 Bad Request
I reviwed other treaths with similar problems
#6409
#6728 --> I added the CA to complete the chain.
So, I think that my configurations is ok and I can't see where the problem is.
Thanks so much for your help
Beta Was this translation helpful? Give feedback.
All reactions