Move adopt/release from profile routes to dedicated /v1/adoptions endpoint. Node API now returns adopted_by field. Profile page shows read-only adopted nodes. Node detail page has adopt/release buttons (operator adopts, admin can release any). Admin release bypasses ownership check.
6.6 KiB
OIDC Authentication
MeshCore Hub supports OpenID Connect (OIDC) for authenticating web dashboard users. When enabled, the web dashboard uses role-based access control to gate API endpoints through the proxy layer.
When OIDC is disabled (the default), the web proxy only allows read (GET) access to API endpoints. Write operations (POST/PUT/DELETE) and unknown endpoints are blocked. Admin operations must be performed via the CLI or direct API access with Bearer tokens.
Architecture
OIDC is implemented entirely in the web dashboard layer. The REST API uses static Bearer token authentication independently of OIDC. The web dashboard proxies API requests and gates access using a per-endpoint, per-method role mapping (ENDPOINT_ACCESS in web/app.py).
Browser → Web Dashboard (OIDC session + API proxy) → REST API (Bearer token)
Role-Based Access
User roles are read from the OIDC token's roles claim (configurable via OIDC_ROLES_CLAIM). The web proxy checks these roles against the ENDPOINT_ACCESS mapping to determine which API endpoints and HTTP methods each user can access.
Defined roles:
| Role | Config Variable | Default | Description |
|---|---|---|---|
| Admin | OIDC_ROLE_ADMIN |
admin |
Full write access to all API endpoints through the proxy |
| Operator | OIDC_ROLE_OPERATOR |
operator |
Reserved for future use — no endpoint assignments yet |
| Member | OIDC_ROLE_MEMBER |
member |
Read-only access (no endpoint assignments) |
The role names are configurable to match your IdP's role naming convention. For example, if your IdP uses superuser instead of admin, set OIDC_ROLE_ADMIN=superuser.
Additional roles can be added to the ENDPOINT_ACCESS mapping in src/meshcore_hub/web/app.py and the corresponding OIDC_ROLE_* config variable.
Endpoint Access Mapping
The proxy uses a hardcoded per-endpoint, per-method mapping in src/meshcore_hub/web/app.py:
| Path prefix | Method | Access |
|---|---|---|
v1/nodes |
GET | Open |
v1/nodes/ |
GET | Open |
v1/nodes/ |
POST, PUT, DELETE | admin |
v1/members |
GET | Open |
v1/members |
POST, PUT, DELETE | admin |
v1/messages |
GET | Open |
v1/advertisements |
GET | Open |
v1/dashboard |
GET | Open |
v1/trace-paths |
GET | Open |
v1/telemetry |
GET | Open |
- Open = no authentication required (anonymous OK, works with or without OIDC)
admin= requires OIDC enabled + user has theadminrole- Method not listed for a matched prefix = denied
- No prefix match = denied
Client-Side Role Checks
The SPA receives the user's roles array in window.__APP_CONFIG__.roles. Client-side pages use the hasRole(roleName) helper, which returns true when OIDC is disabled (open access) or when the user has the specified role.
Login Flow
- User visits
/admin/— no session exists — server redirects to/auth/login?next=/admin/ /auth/loginstores thenextURL in the session and redirects to the IdP- User authenticates at the IdP, which redirects back to
/auth/callback?code=... /auth/callbackexchanges the authorization code for tokens, extracts userinfo and roles, stores them in a session cookie, and redirects to thenextURL- The SPA receives
window.__APP_CONFIG__withoidc_enabled,user, androlesflags - Admin routes are registered client-side only when
hasRole('admin')istrue - Write operations through the API proxy are checked against the
ENDPOINT_ACCESSmapping - Logout (
/auth/logout) clears the session and redirects to the IdP's end-session endpoint
Configuration
All OIDC settings are environment variables. Set OIDC_ENABLED=true to activate.
| Variable | Default | Description |
|---|---|---|
OIDC_ENABLED |
false |
Enable OIDC authentication |
OIDC_CLIENT_ID |
(none) | OAuth2 client ID from your IdP |
OIDC_CLIENT_SECRET |
(none) | OAuth2 client secret from your IdP |
OIDC_DISCOVERY_URL |
(none) | IdP base URL — .well-known/openid-configuration is appended automatically (e.g. https://auth.example.com/oidc) |
OIDC_REDIRECT_URI |
(auto) | Override callback URL (auto-derived from request if not set) |
OIDC_POST_LOGOUT_REDIRECT_URI |
(auto) | Post-logout redirect URI (falls back to OIDC_REDIRECT_URI base or request URL) |
OIDC_SCOPES |
openid email profile |
OAuth scopes to request. The openid scope is required. Quotes are stripped automatically. |
OIDC_ROLES_CLAIM |
roles |
ID token claim name containing user roles |
OIDC_ROLE_ADMIN |
admin |
IdP role name that grants admin access |
OIDC_ROLE_OPERATOR |
operator |
IdP role name for operator access (future use) |
OIDC_ROLE_MEMBER |
member |
IdP role name for member access |
OIDC_SESSION_SECRET |
(none) | Secret for signing session cookies (generate with openssl rand -hex 32) |
OIDC_SESSION_MAX_AGE |
86400 |
Session cookie lifetime in seconds (default: 24 hours) |
OIDC_COOKIE_SECURE |
false |
Set to true to require HTTPS for session cookies |
Local Development (No HTTPS)
To test OIDC locally without TLS:
- Set
OIDC_REDIRECT_URI=http://localhost:8080/auth/callbackexplicitly — auto-derivation may produce an incorrect URL depending on your setup - Keep
OIDC_COOKIE_SECURE=false(the default) — cookies won't be restricted to HTTPS - Register
http://localhost:8080/auth/callbackas a redirect URI in your IdP - Register
http://localhost:8080/as a post-logout redirect URI in your IdP OIDC_SESSION_SECRETis still required — generate one even for local testing
IdP Provider Guides
LogTo
LogTo is an open-source identity provider that works well with MeshCore Hub.
Setup:
- Create a new Traditional Web application in LogTo
- Set the redirect URI to
https://your-hub-domain/auth/callback - Set the post-logout redirect URI to
https://your-hub-domain/ - Copy the client ID and client secret into
OIDC_CLIENT_IDandOIDC_CLIENT_SECRET - Set
OIDC_DISCOVERY_URLto your LogTo endpoint (e.g.https://auth.example.com/oidc)
Required scope changes:
LogTo returns roles via the roles claim in the ID token. You must include roles in the scopes:
OIDC_SCOPES="openid email profile roles"
OIDC_ROLES_CLAIM defaults to roles, which matches LogTo's claim name — no change needed.
Role assignment:
Create an admin role in LogTo and assign it to users who should have write access through the web dashboard. The role name must match OIDC_ROLE_ADMIN (default: admin). If your LogTo setup uses a different role name, set OIDC_ROLE_ADMIN accordingly.