FusionAuth
    • Home
    • Categories
    • Recent
    • Popular
    • Pricing
    • Contact us
    • Docs
    • Login

    Google IdP includes extra port information

    Scheduled Pinned Locked Moved Unsolved
    Q&A
    1
    2
    470
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Q
      qthoang
      last edited by

      Hi. I have a reverse proxy setup to forward https://auth.domain.com to http://localhost:9011 and it's working fine for normal login, and administration. However, using the included Google IdP, the login button would add the extra port number to my redirect_uri and thus makes it return the

      Error 400: redirect_uri_mismatch

      The error details:

      Error 400: redirect_uri_mismatch
      
      You can't sign in to this app because it doesn't comply with Google's OAuth 2.0 policy.
      
      If you're the app developer, register the redirect URI in the Google Cloud Console.
      Request details: redirect_uri=https://auth.domain.com:9011/oauth2/callback
      

      As you can see, it includes the extra port 9011. I'm not sure if this is a bug or some setting that I not aware of. Any help would be appreciated. Thank you.

      1 Reply Last reply Reply Quote 0
      • Q
        qthoang
        last edited by

        An update.

        So, I tried adding another IdP. This time with MS/Azure AD (using the tutorial https://fusionauth.io/docs/v1/tech/identity-providers/openid-connect/azure-ad). While going through the process, it seems that the port number was also added this redirect_uri here. So my guess is, it's hardcoded somewhere for the IdP stuff, and get inserted as part of the redirect without checking the domain/port FA is currenlty being run on.

        1 Reply Last reply Reply Quote 0
        • First post
          Last post