/Google OIDC Auth

Google OIDC Auth

24
v0.3.0

Traefik Google OIDC Auth Middleware

This is a Traefik middleware plugin that authenticates users with Google OpenID Connect, and then checks that their email address or Google Workspace domain is authorized.

Requirements

  • Setup a new project in the Google API console to obtain a client ID and client secret. See the Google developer docs.
  • Install the plugin to Traefik using static config.
  • Configure the middleware in dynamic config.
  • Associate a service to the middleware.

Configuration

OptionDefaultRequiredDescription
oidc.clientIDXOAuth client ID
oidc.clientSecretXOAuth client secret
oidc.callbackPath/oidc/callbackThe path where the OIDC provider will redirect the user after authenticating.
oidc.redirectHostOptional host override for the OIDC redirect URI. Use this to configure a single, central redirect URI for multiple subdomains (e.g., auth.example.com). Requires cookie.domain to be set for cookie sharing.
oidc.promptA space-delimited, case-sensitive list of prompts to present the user. Possible values are: none, consent, select_account. See Google's docs for more info.
cookie.nameoidc_authName of the cookie. It can be customized to avoid collisions when running multiple instances of the middleware.
cookie.path/You can use this to limit the scope of the cookie to a specific path. Defaults to '/'.
cookie.secretXSecret is the HMAC key for cookie signing, and helps provide integrity protection for cookies.
cookie.duration24hValidity period for new cookies. Users are granted access for this length of time regardless of changes to user's account in the OIDC provider. Uses the Go time.Duration format.
cookie.insecurefalseSet to true to omit the Secure attribute from cookies.
cookie.sameSiteLaxSameSite attribute for cookies. Options: Strict, Lax, None. Lax provides CSRF protection while allowing cookies on top-level navigation.
cookie.domainDomain attribute for cookies. Use this to share cookies across subdomains (e.g., .example.com). Must start with a dot. Required when using oidc.redirectHost.
authorized.emailsXList of allowed email addresses.
authorized.domainsXList of allowed domains.
debugfalseEnable debug logging to stdout.

Headers

X-Forwarded-User

When the middleware proxies a request it adds an X-Fowarded-User header containing the user's email address. This can be used by the downstream service to identify the authenticated user.

If you want your JSON access logs to include the user's email address then configure the access log to retain the X-Forwarded-User header. Here is a CLI example:

# Adding X-Forwarded-User to JSON access logs.
--accesslog
--accesslog.format=json
--accesslog.fields.headers.names.X-Forwarded-User=keep

The resulting access log will contain a request_X-Forwarded-User field.

"request_X-Forwarded-User": "[email protected]"

See Limiting the Fields/Including Headers for more details.

Example config

Static config

# traefik.yml
experimental:
plugins:
google-oidc-auth-middleware:
moduleName: "github.com/andrewkroh/google-oidc-auth-middleware"
# Populate this with the latest release tag.
version: vX.Y.Z

Dynamic config

# dynamic.yml
http:
middlewares:
oidc-auth:
plugin:
google-oidc-auth-middleware:
oidc:
clientID: example.apps.googleusercontent.com
clientSecret: fake-secret
cookie:
secret: mySecretKey
authorized:
emails:
domains:
- example.com
routers:
my-router:
rule: host(`localhost`)
service: service-foo
entryPoints:
- web
middlewares:
- oidc-auth

Multi-Subdomain Configuration

When protecting multiple subdomains (e.g., app1.example.com, app2.example.com, app3.example.com) under the same parent domain, you can configure a single central redirect URI instead of registering each subdomain individually with your OAuth provider.

Configuration

This feature requires two settings:

  1. oidc.redirectHost: Set this to a central host that will handle all OIDC callbacks (e.g., auth.example.com)
  2. cookie.domain: Set this to share cookies across all subdomains (e.g., .example.com)

Example

# dynamic.yml
http:
middlewares:
oidc-auth:
plugin:
google-oidc-auth-middleware:
oidc:
clientID: example.apps.googleusercontent.com
clientSecret: fake-secret
redirectHost: auth.example.com # Central callback host
callbackPath: /oidc/callback
cookie:
secret: mySecretKey
domain: .example.com # Share cookies across *.example.com
authorized:
emails:
domains:
- example.com
routers:
# Router for the central callback host
auth-callback:
rule: Host(`auth.example.com`) && Path(`/oidc/callback`)
service: noop@internal
entryPoints:
- web
middlewares:
- oidc-auth
#tls: ...
# Routers for protected subdomains
app1:
rule: Host(`app1.example.com`)
service: service-app1
entryPoints:
- web
middlewares:
- oidc-auth
app2:
rule: Host(`app2.example.com`)
service: service-app2
entryPoints:
- web
middlewares:
- oidc-auth
app3:
rule: Host(`app3.example.com`)
service: service-app3
entryPoints:
- web
middlewares:
- oidc-auth

Google OAuth Setup

In your Google OAuth console, you only need to register one authorized redirect URI:

https://auth.example.com/oidc/callback

Instead of having to register:

  • https://app1.example.com/oidc/callback
  • https://app2.example.com/oidc/callback
  • https://app3.example.com/oidc/callback

How It Works

  1. User visits https://app1.example.com
  2. Middleware redirects to Google OAuth with redirect_uri=https://auth.example.com/oidc/callback
  3. User authenticates with Google
  4. Google redirects to https://auth.example.com/oidc/callback
  5. Middleware sets a cookie with Domain=.example.com (shared across all subdomains)
  6. Middleware redirects user back to original URL: https://app1.example.com
  7. User can now access any subdomain without re-authenticating (cookie is shared)

Requirements

  • All protected sites must be under the same eTLD+1 (e.g., *.example.com)
  • Sharing cookies across different apex domains (e.g., example.com vs example.org) is not supported