-
Notifications
You must be signed in to change notification settings - Fork 353
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
jwtValidation and forwardTokenField filters #1811
Conversation
I like the name |
I think naming us fine, but only reading the pr message, I think we miss an auto refresh of JKS. Keys (public keys). See tokenintrospection filters for issuer well known configuration integration. |
dc8745a
to
11a740a
Compare
I suppose to have resolved all the issues mentioned by review. @szuecs @AlexanderYastrebov can you have a look once you get time please. |
Other than the godoc is fine to merge IMO. |
This comment has been minimized.
This comment has been minimized.
@abinet Please update PR description to match the implementation (you may squash commits and write a detailed commit message that could be used as PR description) |
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
please rebase to master as we merged the fix for master, thanks |
The last missing piece IMO is #1811 (comment).
I want to have it because |
👍 |
Signed-off-by: Andriy Binetsky <[email protected]>
👍 |
1 similar comment
👍 |
@abinet Thanks great work! |
The filter extracts Authorization Bearer token, validates using public keys of Authorization server and stores info into same map as oauthOidcUserInfo does. So we can use oidcClaimsQuery for filtering based on claims extracted from the token.
Filter parameters are:
jwtValidation(authorization_provider_url, claims, upstream_headers)
Here is the example of usage:
zalando.org/skipper-filter: jwtValidation("https://login.microsoftonline.com/<tenant_id>/v2.0/",
"sub", "X-Remote-User:sub") -> oidcClaimsQuery("/:groups.#[=="group-a"]","/:groups.#[=="group-b"]")
#1810