-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Non-OIDC JWT Connector #2450
Comments
I think I have a very similar use case:
The JWT validation requires the following config data:
The JWT is included in a request as a cookie and header. There is also an additional header |
Speaking about generic JWT connector implementation, there should be precisely two layers:
Custom logic, e.g., receiving groups from endpoints and a userid from a header, should be implemented as an external connector. And it would be better to write design documentation first. |
Has there been any progress related to this issue? I have the same use case as @john-delivuk and may be able to help out if needed. |
Bumping the interest in this feature |
+1, integration with Cloudflare Zero Trust (Access) is very nice to have |
There is the Token Exchange feature that can be used to exchange one JWT token for another. It only requires the OIDC discovery endpoint (with the valid JWKS uri). |
@nabokihms — Token Exchange seems like an interesting feature—and one I'm unfamiliar with. I don't think it fully solves the JWT case though; or at least not by itself, but please correct me if I'm wrong. The Token Exchange docs describe performing an exchange—hitting dex's Thanks! |
Preflight Checklist
Problem Description
OIDC is becoming the preferred SSO protocol for most open source tooling. Today, my organization connects dex to apps like k8s dashboard, vault, argo, kafka-ui and we're happy with the result. We've now added Gravitational Teleport to the stack, and we were looking to leverage their JWT signing capabilities.
In a perfect world, Teleport could be our OIDC IDP, but they don't have that function. However they present a JWT to the application, which doesn't quite make the end meet to allow their app proxy to handle authentication.
Proposed Solution
A Dex connector that could sign OIDC tokens based on valid JWT's. Ideally some mapping from the JWT attributes to the OIDC scopes would be configured, as JWT is very loose in terms of specification. I imagine other JWT signing IDP's could take advantage of this connector as well.
Alternatives Considered
I may be lacking details around OIDC or JWT that would make this solution unnecessary. Happy to hear any feedback.
Additional Information
Teleport JWT / App Proxy
The text was updated successfully, but these errors were encountered: