-
Notifications
You must be signed in to change notification settings - Fork 149
Add support for token auth via HTTP Header #39
Comments
Check out #40 for a possible implementation |
To clarify what #40 is trying to achieve: I understand that this should take care of your request, @tallpauley, what do you think? |
@djenriquez yeah, configurable header name is a nice touch. Exactly what I'm looking for, and I can close the issue as soon as change is made to PR and it merges. Thanks for the fast contribution @msessa-cotd |
#40 Merged |
@djenriquez This doesn't seem to be working for me.
|
Yup, and I see the bug already. Surprising we got this far without anyone noticing it. Will have a fix here in a bit @rohitkoul |
@rohitkoul: #220, merging in, feel free to test on |
I would love if Vault UI could read a Vault token in
X-Remote-User
(or whatever name) if present, allowing use of custom SSO front-end. In my use case, we would have a SAML 2.0 SSO proxy which could use a hook to get a Vault token for a user and pass it along to Vault UI so that the user wouldn't need to log in again after SSO.SAML for Vault is sort-of in-progress but the future is unclear due to variance in SAML implementations. The ability to read a Vault token from
X-Remote-User
would be a nice universal adapter for SSO not-yet-supported by Vault (or never supported by Vault). It doesn't compromise security since Vault tokens can't be forged.By the way, this UI is the most promising Vault UI i've seen so far. Keep up the good work!
The text was updated successfully, but these errors were encountered: