-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support keystore configuration for mutual TLS in oidc and oidc-client #19634
Comments
/cc @pedroigor, @sberyozkin |
@sberyozkin thanks for pointing that out! I closed the other issue as you suggested. |
@famod, by the way, if you need a way to avoid sending a client secret over the wire then you can use the client JWT authentication - is is all supported: |
I surely would like to see support for this. I'm not sure what is the case for client MTLS authentication given that the JWT authentication is totally secure and does not leak the secrets on the wire So please support this :) |
@argenstijn, sorry for a delay - I've noticed your comment only today.
Makes sense |
Description
#18012 added trust store support and we discussed key store support for client auth/mutual TLS.
This issue shall prevent that enhancement from falling through the cracks.
/cc @sberyozkin
Implementation ideas
No response
The text was updated successfully, but these errors were encountered: