Hi, on my test server when I try to login I get error 404? Single controller and running 2.0.0-pre2, ZAC works. Been upgraded 1.6.12 → 1.8.0-pre5 → 2.0.0-pre2
root@pilvipannu:~# ./ziti-2.0.0-pre2 edge login
Enter controller host[:port] (default localhost:1280):
Untrusted certificate authority retrieved from server
Verified that server supplied certificates are trusted by server
Server supplied 2 certificates
Trust server provided certificate authority [Y/N]: Y
Server certificate chain written to /root/.config/ziti/certs/localhost_1280
Enter username: admin
Enter password:
Error: [POST /authenticate] authenticate (status 404): {}
Usage:
ziti edge login my.controller.hostname[:port]/path [flags]
Flags:
--ca string additional root certificates used by the Ziti Edge Controller
-i, --cli-identity string Specify the saved identity you want the CLI to use when connect to the controller with
-c, --client-cert string A certificate used to authenticate
....
root@pilvipannu:~# ./ziti-2.0.0-pre3 edge login
Enter controller host[:port] (default localhost:1280): localhost:8443
Untrusted certificate authority retrieved from server
Verified that server supplied certificates are trusted by server
Server supplied 2 certificates
Trust server provided certificate authority [Y/N]: Y
Server certificate chain written to /root/.config/ziti/certs/localhost_8443
Enter username: admin
Enter password:
Error: failed to initiate authorization flow: could not find auth request id header from authorize endpoint
Usage:
ziti edge login my.controller.hostname[:port]/path [flags]
Flags:
--ca string additional root certificates used by the Ziti Edge Controller
-i, --cli-identity string Specify the saved identity you want the CLI to use when connect to the controller with
Would you be willing to share your controller's config file privately with me? Either DM here on discourse, email to clint at openziti.org or something like that? I'm interested in how you have your config setup. I have done exactly this on my long-running instance and I have not had this particular problem. It makes me wonder if there's something in your config that's different in some way.
Do you perhaps "split" your management api? Do you perhaps NOT have oidc exposed externally?
Yes I have split management. If you mean edge-oidc it’s publicly accessible.
Port 1280 is accessed through haproxy because port 443 is shared with router also.
You could try adding the edge-oidc endpoint to the internal "management" api section as well. There's no problem with having "edge-oidc" on there twice.