-
Notifications
You must be signed in to change notification settings - Fork 62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement acr_values for oidc #276
base: main
Are you sure you want to change the base?
Conversation
OTOH on second reading I am not sure this is not a per-role configuration. |
* Adding support for `acr_values` configuration of oidc endpoint * Adding support for `acr_values` configuration of each role Ref: https://openid.net/specs/openid-connect-core-1_0.html#AuthRequest
I reworked it to support Please give some feedback if this would fit into the general design of the plugin/auth method. |
The tests have passed.
|
Asking for some insights if there are any ideas on if/how you would accept a contribution for the support of acr values |
Hi @matya - Thanks for this contribution. I'm looking at this and will provide my thoughts. |
@matya - I'm curious to hear your thoughts on how we should be processing the My understanding from the OIDC spec is that requesting it via
|
Validating claims can already be performed by bound_claims so I was not sure if I wanted to pollute the config options with something like So either
This also is the least to most effort for implementing. |
@matya - I'm mostly looking for an answer on what is technically correct per the OIDC spec or common in other OIDC relying parties (i.e., clients) making use of |
I have found some time to search the publicly available hashicorp repos. For now what I have found to be similar in function is this: I didn't find any validation of validation for that feature. Maybe you find something else in other non public repos or if you find the time, can discuss it with the appropriate people. |
@austingebauer Sorry to bug you, just wanted to clarify if this is something that can be considered for contribution? I would start working on a PR-proposal on the documentation or rework it if any feedback could be provided. |
Overview
This feature enables users of the OIDC authentication flow to specify ACR values, as outlined by the OIDC specification. This is mostly used when performing MFA and instructs the auth provider about the required methods (example for Okta).
The modification introduces a new optional configuration option called
acr_values
in the API, which provides the necessity interface to configure such values. Without this, no other way exists to enforce the security requirements that are enforced by the ACR values.Design of Change
The change is aligned with existing parameters and settings within the codepaths, and present a diff with minimal complexity and easy testability, as the backend only needs to append another key=value pair to the querystring of the auth_url, which is fairly straigt forward using the already present implementation in the used
hashicorp/cap
package.Related Issues/Pull Requests
[ ] Issue #275
[ ] PR #1234
Contributor Checklist
[ ] Add relevant docs to upstream Vault repository, or sufficient reasoning why docs won’t be added yet
My Docs PR Link
Example
[ ] Add output for any tests not ran in CI to the PR description (eg, acceptance tests)
[ ] Backwards compatible
Documentation is WIP.