Support Claims based validation and routing #4417
jasonwilliams14
started this conversation in
Ideas
Replies: 2 comments
-
It would also be nice to be able to log any response code from the IdP or login error for troubleshooting purposes. |
Beta Was this translation helpful? Give feedback.
0 replies
-
An example:
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
NGINX Ingress controller supports dynamically fetching public keys from IdP for JWT validation.
For users that have a requirement to validate specific claims in a JWT token or to perform routing based on a claim, this will allow the capability to inspect JWT tokens for specific
claims
. By inspecting these claims, customers can further take action onclaims
inside the token, orclaims
missing from a JWT token, giving them powerful routing capabilities based on a JWT token.A few new items will need to be added to NGINX Ingress controller.
These include:
$jwt_payload
for enhanced capabilities.$jwt_
as supportedvariable
options when usingmatch
andconditions
auth_jwt_require
to doclaims
validation/routing.NGINX Ingress controller can be configured to look for specific
claims
in a JWT tokenDocumentation on VirtualServer.Routes.path.matches.conditions
Prototype policy:
In the prototype above, we can enforce a number of different claims with
auth_require
.In the virtualserver resource, wee can use
match
to look for specific$jwt_client_id
and a defined value and then proxy to the backend application.We can further enhance this by sending back specific HTTP codes (401 or 403) if a claim is empty or has the incorrect value.
Beta Was this translation helpful? Give feedback.
All reactions