Support Claims based validation and routing #4417
jasonwilliams14
started this conversation in
Ideas
Replies: 2 comments
-
It would also be nice to be able to log any response code from the IdP or login error for troubleshooting purposes. |
Beta Was this translation helpful? Give feedback.
0 replies
-
An example:
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
NGINX Ingress controller supports dynamically fetching public keys from IdP for JWT validation.
For users that have a requirement to validate specific claims in a JWT token or to perform routing based on a claim, this will allow the capability to inspect JWT tokens for specific
claims
. By inspecting these claims, customers can further take action onclaims
inside the token, orclaims
missing from a JWT token, giving them powerful routing capabilities based on a JWT token.A few new items will need to be added to NGINX Ingress controller.
These include:
$jwt_payload
for enhanced capabilities.$jwt_
as supportedvariable
options when usingmatch
andconditions
auth_jwt_require
to doclaims
validation/routing.NGINX Ingress controller can be configured to look for specific
claims
in a JWT tokenDocumentation on VirtualServer.Routes.path.matches.conditions
Prototype policy:
In the prototype above, we can enforce a number of different claims with
auth_require
.In the virtualserver resource, wee can use
match
to look for specific$jwt_client_id
and a defined value and then proxy to the backend application.We can further enhance this by sending back specific HTTP codes (401 or 403) if a claim is empty or has the incorrect value.
Beta Was this translation helpful? Give feedback.
All reactions