You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
Tyk nicely supports configuring multiple OIDC identy providers in parallel in the OpenId Connect middleware openid_options
within an apidefintion. Unfortunately, the JWT middleware only supports configuring one global jwt_source endpoint for signature verification, so effectively, only one OIDC IdP can be securely used (i.e. with signature verification).
Describe the solution you'd like
We'd like to be able to configure one JWKS source URL per OIDC IdP, either within the openid_options.providers entry, or alternatively (and likely easier to implement due to being a different middleware), as an alternative jwt_sources property, that could look like this (using the same issuer URLs that are used in the openid_options):
The only alternative to solve the issue is to implement an "aggregating proxy", i.e. a component that collects & combines all key sets from all the OIDC IdPs, and generates a huge list containing all keys from all IdPs. In assition to the need for extra infrastructure, this has a significant risk of causing issues due to non-unique kids, that may occur with different providers.
Additional context
none
The text was updated successfully, but these errors were encountered:
djablonski-moia
changed the title
Support mulriple JWKS sources / one source per OIDC provider/issuer
Support multiple JWKS sources / one source per OIDC provider/issuer
May 31, 2024
Hi @djablonski-moia,
We are actually deprecating the dedicated OIDC Auth middleware from the next release, due to known limitations in the implementation - and recommend that users switch to the JWT Auth middleware (don't worry, we won't be EOL-ing the middleware just yet).
From your description, I'm guessing this recommended alternative won't fit your needs.
I'd be interested to understand what is missing from the JWT Auth capability to support your use case
Is your feature request related to a problem? Please describe.
Tyk nicely supports configuring multiple OIDC identy providers in parallel in the OpenId Connect middleware
openid_options
within an
apidefintion
. Unfortunately, the JWT middleware only supports configuring one globaljwt_source
endpoint for signature verification, so effectively, only one OIDC IdP can be securely used (i.e. with signature verification).Describe the solution you'd like
We'd like to be able to configure one JWKS source URL per OIDC IdP, either within the
openid_options.providers
entry, or alternatively (and likely easier to implement due to being a different middleware), as an alternativejwt_sources
property, that could look like this (using the sameissuer
URLs that are used in theopenid_options
):Describe alternatives you've considered
The only alternative to solve the issue is to implement an "aggregating proxy", i.e. a component that collects & combines all key sets from all the OIDC IdPs, and generates a huge list containing all keys from all IdPs. In assition to the need for extra infrastructure, this has a significant risk of causing issues due to non-unique
kid
s, that may occur with different providers.Additional context
none
The text was updated successfully, but these errors were encountered: