Apologies for the somewhat belated notification of this change. We merged this change on November 27th.
As part of our ongoing work to reduce the divergence between the Phalanx TAP service and the CADC releases, we’ve changed the Phalanx configuration for the TAP services to use the CADC OpenID Connect authentication model. This affects the tap
, ssotap
, and livetap
Phalanx applications. Those services, in the current Phalanx configuration, will look for an OpenID Connect authentication at the root URL of the Phalanx deployment and then use that userinfo
endpoint to get user information.
What this means for you is that the Gafaelfawr OpenID Connect server must be enabled for the TAP services to work. This requires setting config.oidcServer.enabled
to true
.
When you do this, you will also need to set the oidc-server-secrets
key in the Gafaelfawr secret, however you maintain your Phalanx services. If you have no other clients of the OpenID Connect server, you can set the value of this secret to []
(the empty JSON list), but it must be present.
(Details for those who care: the TAP services aren’t really OpenID Connect clients in that they don’t do a full OpenID Connect authentication, which is why they don’t have to be set up in the secret as a valid client. They are just reusing the userinfo
route and configuration auto-discovery to get user metadata in a format that they know how to parse. Doing this via the configuration and route for the OpenID Connect server is a bit of a hack, but it was the most expedient way to support this pattern.)