You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Follow up from #1930, regarding support for insecure remote JWKS endpoint.
Currently, JWT policy only supports secure endpoints through HTTPS for the remote JWKS endpoint. For particular reasons such as when the JWKS endpoint is expected to be internally accessible within the Kubernetes cluster, in that case adding a secure layer might not needed.
The workaround that we have done so far was to patch the code to add support when the JWKS endpoint uses http://..., thus it will omit the tls socket config under the cluster config. The example patch can be seen here.
With the above patch, you can apply the below configuration.
@ardikabs Thanks for the feedback. I think it's reasonable to support plain HTTP jwks and ext auth servers, but OIDC servers should stick to HTTPS. WDYT @arkodg ?
Description:
Currently, JWT policy only supports secure endpoints through HTTPS for the remote JWKS endpoint. For particular reasons such as when the JWKS endpoint is expected to be internally accessible within the Kubernetes cluster, in that case adding a secure layer might not needed.
The workaround that we have done so far was to patch the code to add support when the JWKS endpoint uses
http://...
, thus it will omit thetls
socket config under thecluster
config. The example patch can be seen here.With the above patch, you can apply the below configuration.
[optional Relevant Links:]
The text was updated successfully, but these errors were encountered: