Skip to content
This repository has been archived by the owner on Oct 11, 2024. It is now read-only.

any ETA on Open ID Connect configuration being (re?)enabled for the operator? #374

Answered by asoorm
jbiskur asked this question in Q&A
Discussion options

You must be logged in to vote

Hello - there was no immediate intention to implement OIDC with the Tyk Operator https://github.com/TykTechnologies/tyk-operator/blob/master/docs/api_definitions.md#client-to-gateway-authentication. It should be possible to use the native / lower level JWT auth mode. It would be good to understand what exactly is not working with your Keycloak setup so that this can be fixed.


You can use this as a template: https://github.com/TykTechnologies/tyk-operator/blob/master/config/samples/jwt-auth/example1.yaml

In any OIDC provider, you will have a public .well-known/openid-configuration endpoint. You can replace the jwt_source with the JWKS URI. And the jwt_identity_base_field can be the field …

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by sedkis
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants