mirror of
https://github.com/photoprism/photoprism.git
synced 2026-03-02 22:57:18 -05:00
OpenID-Connect: Support RP-Initiated Logout - Logout also from OIDC-Provider #2476
Labels
No labels
ai
android
api
auth
awesome
bug
bug
ci
cli
config
database
declined
deprecated
docker
docs 📚
documents
duplicate
easy
enhancement
enhancement
enhancement
epic
faces
feedback wanted
frontend
hacktoberfest
help wanted
idea
in-progress
incomplete
index
invalid
ios
labels
live
live
low-priority
macos
member-feature
metadata
mobile
nas
needs-analysis
no-coding-required
no-coding-required
observability
performance
places
please-test
plus-feature
priority
pro-feature
question
raspberry-pi
raw
released
released
released
research
resolved
security
sharing
tested
tests
third-party-issue
thumbnails
upgrade
upstream-issue
ux
vector
video
waiting
won't fix
won't fix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/photoprism#2476
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Timo-1979 on GitHub (Jan 28, 2026).
Confirmation
What Problem Does This Solve and Why Is It Valuable?
I've configured to login into photoprism by KeyCloak (OIDC). But if I logout from photopism, I'll still logged in into KeyCloak (only the photoprism-session is killed, but not the KeyCloak-session).
I'm redirected to the login screen of photoprism and on the click to login via keycloak - I'm logged in again to photoprism - without enter any credentials.
The user must remember to logout manually from KeyCloak to be completely logged out.
What Solution Would You Like?
Add a Configuration-Parameter: PHOTOPRISM_OIDC_LOGOUT_URI
The flow should something the like this:
What Alternatives Have You Considered?
Reverse-Proxy-Authentication (Needs to install a reverse-proxy, maybe install addional plugin(s) or use the oauth2-proxy and configure the reverse-proxy to redirect the correct request to that.
But this looks complex just for a home-lab.
Additional Context
Information about RP-Initiated Logout at openid.net