What has changed?
- You can now use the built-in trusted networks auth provider alongside OIDC. It will be automatically detected without any further configuration.
- See #283 for more details.
- The order of configuration of the auth providers matters, just as described in the HA docs.
- Fixes an issue where the redirect URI would be HTTP instead of HTTPS if force_https was on
- Fixes an issue where the auth page injection would not always work
- Fixes the broken 'back' button on the normal HA login screen
Full changelog
- Add Keycloak configuration guide and refine setup instructions by @NiklasUni in #291
- Implement trusted_networks support by @christiaangoossens in #283
- Do not reveal existance of trusted networks provider by @christiaangoossens in #302
- Use HTTP proxy for connecting to auth server if configured via env by @amarshall in #299
- Redirect native-picker click on OIDC provider to /auth/oidc/welcome (fix dead-end) by @mexican75 in #266
- Respect force https on the initial redirect URI by @christiaangoossens in #303
- Release/1.1.0 (and fix #309) by @christiaangoossens in #313
New Contributors
- @NiklasUni made their first contribution in #291
- @amarshall made their first contribution in #299
- @mexican75 made their first contribution in #266
Full Changelog: v1.0.2...v1.1.0