Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add constraints on arbitary attributes for certificate-based authentication #4560

Open
bluecmd opened this issue May 13, 2018 · 3 comments
Open
Labels

Comments

@bluecmd
Copy link
Contributor

bluecmd commented May 13, 2018

Feature Request:
Like in #2595, but for all subject attributes.

In my case I have a need to assign policies based on the O= and OU= attribute.
Restricting matching on a base, like saying the certificate must be based at O=Company,C=Sweden is fine as well (which would match CN=test.se,O=Company,C=Sweden but not CN=test.no,O=Company,C=Norway)

Let me know if you need more details.

@jefferai
Copy link
Member

Dup of #4562

@bluecmd
Copy link
Contributor Author

bluecmd commented May 16, 2018

No. This is for auth. The other one is for generation.

@jefferai jefferai reopened this May 17, 2018
@catsby catsby added auth/cert Authentication - certificates feature-request labels Nov 8, 2019
@vishalnayak
Copy link
Member

Issues that are not reproducible and/or not had any interaction for a long time are stale issues. Sometimes even the valid issues remain stale lacking traction either by the maintainers or the community. In order to provide faster responses and better engagement with the community, we strive to keep the issue tracker clean and the issue count low. In this regard, our current policy is to close stale issues after 30 days. Closed issues will still be indexed and available for future viewers. If users feel that the issue is still relevant but is wrongly closed, we encourage reopening them.

Please refer to our contributing guidelines for details on issue lifecycle.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

6 participants