Client_secret is missing error when using Google OIDC to authenticate to AWS (STS) - overriding the profile #17552
-
|
I'm experimenting with Cyberduck. I want to perform basic S3 actions without storing long-term credentials on my PC. The current flow uses Google OIDC to obtain an STS token, but the built-in profile uses a predefined Client ID and appears to use https://cyberduck.io/oauth as the redirect URL. I want to host my own Google App (User type: internal, aka Workspace only access) and use it's Client ID. I could allow I have read that CyberDuck had some verification issues with Google, so my guess is that it was made to simplify the process of creating and handling that part with Google App for the users? Do you have any suggestions for achieving this? Footnotes |
Beta Was this translation helpful? Give feedback.
Replies: 4 comments 5 replies
-
Beta Was this translation helpful? Give feedback.
-
|
I am currently updating the available profiles 1 as we have refactored the implementation to authenticate with temporary credentials from AWS STS 2 scheduled for version 9.3. I have written a tutorial for integration with Microsoft Entra ID 3 and will do the same for Google OIDC. I will follow up here.
Footnotes |
Beta Was this translation helpful? Give feedback.
-
|
First of all, @dkocher thank you for the answer :) I'd like do to something like this: {
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Federated": "accounts.google.com"
},
"Action": "sts:AssumeRoleWithWebIdentity",
"Condition": {
"StringEquals": {
"accounts.google.com:aud": "<prefix_from_my_client>.apps.googleusercontent.com",
"accounts.google.com:sub": ...
}
}
}
]
}to have full control of the flow. If I understood correctly, it is not possible at the moment because of the error that I reported above? Is there any workaround (besides reusing OAuth reg) until official docs and come up? I managed to make it till this secret error, but I'm wondering if there is any other way or fix which I can use. Note from the script above, there is no need to create an IdP for it on AWS (build-in one for Google can be used)1. It may be useful for the docs. Footnotes |
Beta Was this translation helpful? Give feedback.
-
|
Please attach a debug log if you can reproduce the Client_id is missing error. |
Beta Was this translation helpful? Give feedback.




Please try with a iOS application type when registering a client in the Google Auth Platform. It does not require a client secret.