-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add an optional authentication mode for HTTP resources #41959
Comments
Pinging @elastic/kibana-platform |
@restrry does the |
no, it something similar to |
Superseded by #50634 |
I need feedback from the @elastic/kibana-security before starting working on it.
That doesn't play well with an optional auth that we want to introduce since a user should have access to a resource if not authenticated. I'd suggest introducing an explicit
There are still 2 authentication outcomes in the gray zone. kibana/x-pack/plugins/security/server/authentication/index.ts Lines 141 to 147 in 5b5421c
But I still not sure how to handle redirection to 3rd party IdP - probably is not expected for optional authentication. Any thoughts?
Another question: Does the Security plugin need access to the current auth mode? |
I assume you meant allowing requests without any credentials. Otherwise it'd be more like
Don't have a strong and formed opinion on that yet and would like to hear more thoughts from the Team, but I'm leaning towards
Even though my initial reaction was that it may be useful to have it in auth hook, I don't have a compelling use case in mind yet. So if none of us can think of one maybe we can expose it only when we need it. |
@azasypkin just to make sure I understand, it sounds like you're agreeing with @restrry here, in that we should not perform IdP redirection for If so, I agree with the both of you. |
Yes, that's correct. The second question we were discussing is who (Core or Security) will be making this decision, the consensus currently is to delegate that to the Core (Security will still have all the primitives in place to take control over that decision in case we need it). |
That makes sense to me |
@legrego then we need to change auth interceptor interface & refactor Security plugin. Steps:
|
Create the final requirement and discuss implementation details with @elastic/kibana-security team. Context #39446 (comment)
We need a separate mode for HTTP service, providing access to user credentials and current authentication status to understand whether the Kibana server can perform any operations on behalf of the current user.
It somethings similar to Hapi
auth: optional
orauth: try
mode.The text was updated successfully, but these errors were encountered: