-
Notifications
You must be signed in to change notification settings - Fork 340
Description
Is your feature request related to a problem?
when using JWT it is cumbersome to manage the public keys / certificates directly in the config file (or as environment variables), making adding/removing issuers and general key rotation a pain.
What solution would you like?
it should be possible to define a JWKS endpoint for JWT-based authentication.
note: it might be that this already works (because JWT is used within OpenID connect), but it's definitely undocumented and so i don't know how we could set this up. so at the very least this would require a documentation update, worst-case it might need some enhancements.
What alternatives have you considered?
see above:
- store the keys in the config file
- store the keys in environment variables which are referenced in config files
both of these also require one auth domain per issuer, which is suboptimal.
Do you have any additional context?
- JWK & JWKS specification: RFC 7517
- this is already fully supported when using OpenID connect: OpenID Connect OpenSearch Security Documentation