-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support OIDC Client JWT Bearer authentication #38541
Support OIDC Client JWT Bearer authentication #38541
Conversation
🙈 The PR is closed and the preview is expired. |
95ac52d
to
27e68da
Compare
27e68da
to
5f8d63f
Compare
Status for workflow
|
Status for workflow
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, @sberyozkin.
Thanks @pedroigor, that should help with picking up other dynamically generated sensitive data the secrets you mentioned etc |
I've tested the current 999-SNAPSHOT version and it works, but only If I add the client id again...
at the end of new clode block for My current workaround is to override my custom filter method like so:
BTW: Without setting the client-id again in the additionalParameters Map, Azure was giving me the error |
There is still another problem with the current snapshot implementation. After a while, I guess when the token gets renewed after it expired, the filter passes multiple times the client_assertion_type parameter. Especially the OIDC provider at Azure only expects the parameter exactly once. The response from the OIDC provider is than correctly:
Since the actual requests to the OIDC provider cannot be logged by enablng some application.properties I've added another custom Filter to debug what actually got sent to the provider:
|
See also Does oidc-client support jwt-bearer as an authorization grant type for azure workload identity? #38458.