Skip to content

Commit 67b10fe

Browse files
authored
Merge pull request #35 from writemike/patch-1
Update troubleshooting section in README.md
2 parents cd81dd0 + 6aa599e commit 67b10fe

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

README.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -199,6 +199,10 @@ Any errors generated by the OpenID Connect flow are logged to the error log, `/v
199199
* Check for `could not be resolved` and `empty JWK set while sending to client` messages in the error log. This is common when NGINX Plus cannot reach the IdP's `jwks_uri` endpoint.
200200
* Check the `map…$oidc_jwt_keyfile` variable is correct.
201201
* Check the `resolver` directive in **openid_connect.server_conf** is reachable from the NGINX Plus host.
202+
* Check for `OIDC authorization code sent but token response is not JSON.` messages in the error log. This is common when NGINX Plus cannot decompress the IdP's response. Try add the following configuration snippet to the `/_jwks_uri` and `/_token` locations in the openid_connect.server_conf file.
203+
```nginx
204+
proxy_set_header Accept-Encoding "gzip";
205+
```
202206

203207
* **Authentication is successful but browser shows too many redirects**
204208
* This is typically because the JWT sent to the browser cannot be validated, resulting in 'authorization required' `401` response and starting the authentication process again. But the user is already authenticated so is redirected back to NGINX, hence the redirect loop.

0 commit comments

Comments
 (0)