-
Notifications
You must be signed in to change notification settings - Fork 4
Token authentication -> edge #616
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: antalya
Are you sure you want to change the base?
Conversation
fbe5c4c
to
10f04f6
Compare
This is an automated comment for commit 2db35e6 with description of existing statuses. It's updated for the latest CI running ❌ Click here to open a full report in a separate page
Successful checks
|
327789d
to
ef6b54c
Compare
28dbe3f
to
8fbceb8
Compare
@@ -152,7 +155,7 @@ bool authenticateUserByHTTP( | |||
if (spnego_challenge.empty()) | |||
throw Exception(ErrorCodes::AUTHENTICATION_FAILED, "Invalid authentication: SPNEGO challenge is empty"); | |||
} | |||
else | |||
else if (Poco::icompare(scheme, "Bearer") < 0) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
!= 0
?
|
||
#### Parameters: | ||
|
||
- `provider` - name of provider that will be used for token processing. Mandatory parameter. Possible options: `google`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"and 'azure'"
In order to enable JWT authentication for the user, specify `jwt` section instead of `password` or other similar sections in the user definition. | ||
|
||
Parameters: | ||
- `claims` - An optional string containing a json object that should be contained in the token payload. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If take me as reference customer and document reader, it's not clean, what exactly can be in payload.
I found docs for Google (https://developers.google.com/wallet/reference/rest/v1/Jwt) and MS (https://learn.microsoft.com/en-us/entra/identity-platform/access-token-claims-reference) and saw there other fields, but no resource_access
.
May be add some links here, or samples for different providers?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actually, I inherited this thing, and I think I will remove it: it can be confusing indeed, and its use case is not obvious. Also, it makes code somewhat more complex
<users> | ||
<!- ... --> | ||
<my_user> | ||
<!- ... --> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
<jwt>
(open tag)
44be855
to
ec9421d
Compare
7e1dfac
to
2db35e6
Compare
722d7e3
to
82a3904
Compare
Add aspell Enable jwt-cpp in fasttest Add test + some minor improvements reduce unneeded possible clash points fix parsing create user identified with jwt refactor + fix not lowercase update test fix typo in docs fix logical_error some refactor fix alg in jwks fix jwks fix user auth method not being checked update docs better exception on no sub claim throw exception if algo not specified in jwk Support access token authorization of existing users Also possible to filter users by e-mail using regex fix token accessstorage Add Azure token processor, move JWKS logic to separate file remove docs that will be obsolete in future remove redundant
fix credentials cast + some better code
Introduce token (OAuth) authentication.
Changelog category (leave one):
Changelog entry (a user-readable short description of the changes that goes to CHANGELOG.md):
Introduce token (OAuth) authentication.
Documentation entry for user-facing changes