Bad Gateway at the end of OIDC flow with Microsoft Entra and no Dex #21025
Replies: 3 comments
-
Same behavious with 2.14.10 |
Beta Was this translation helpful? Give feedback.
-
We resolved that problem by configuring groups in the dex configuration, by adding only the relevant OIDC groups that a user should have when trying to log in. For your reference, a snippet from our gitlab dex config: apiVersion: v1
data:
dex.config: |
connectors:
- name: Gitlab
type: gitlab
id: gitlab
config:
clientID: your-ID
baseURL: my-gitlab-nstance.com
clientSecret: $gitlab-oidc:secret # ref to a secret
redirectURI: my-gitlab-instance.com/api/dex/callback
url: https://cool-argo.mydomain.com
groups:
- admins
- non-admins
- trainees
kind: ConfigMap
name: argocd-cm
namespace: argocd |
Beta Was this translation helpful? Give feedback.
-
We encountered exactly the same problem. In our case, we found the following log in the Nginx ingress controller's log:
After searching in the internet, adding the following annotations to the Argo CD ingress setting solved the problem.
|
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
I'm trying to enable Microsoft Entra as SSO for our ArgoCD instance installed from the Helm chart (
v7.7.6
) using OIDC (not SAML). I've followed the guide here: https://argo-cd.readthedocs.io/en/stable/operator-manual/user-management/microsoft/#entra-id-app-registration-auth-using-oidcThe relevant Helm values I use are:
When I log in via SSO in ArgoCD, I get directed through Entra and back to ArgoCD, but then the Ingress returns a 502 😕 We're using ingress-nginx
From the
argocd-server
logs, it seems the login succeeds:The ingress-nginx logs are not much more helpful:
Any idea what's going on? Thank you!
Edit: I get the same behavior on ArgoCD 2.12.4 (Helm Chart 7.6.10).
Beta Was this translation helpful? Give feedback.
All reactions