-
Notifications
You must be signed in to change notification settings - Fork 327
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
returning claims from user_info as X-Vouch-IdP-Claims-* headers #221
Comments
Take a look at the config examples for how to pass claims as headers...
https://github.com/vouch/vouch-proxy/blob/master/config/config.yml_example#L95-L103
…On Sun, Mar 8, 2020 at 1:35 PM Roger Gomez Olivares < ***@***.***> wrote:
*Describe the problem*
After the user was authenticated and can go to the protected service, the
only information we have about the user is the header *x-vouch-user*. Can
we get any other information assuming the external provider is sending that
information?
*Expected behavior*
In this specific case, other information is requested, for scope is:
OpenID, email, profile.
The auth response header is just x-vouch-user per the example in the main
page:
nginx.ingress.kubernetes.io/auth-response-headers: x-vouch-user
But I'm looking for any other information that we can pass to the
protected service, for example, the email or the profile.
*Additional context*
For testing purposes right now the protected service is httpbin and I'm
getting the following headers:
https://hastebin.com/eyiroviyax.bash
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#221?email_source=notifications&email_token=AAJUV23VWMPGJGAIPFWJ6PLRGQFSVA5CNFSM4LD4WPBKYY3PNVWWK3TUL52HS4DFUVEXG43VMWVGG33NNVSW45C7NFSM4ITM4RXA>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAJUV253Z7UJU2IPSUYOLW3RGQFSVANCNFSM4LD4WPBA>
.
|
Hi @bnfinet , thanks for your help.
But still not getting the header with the groups. |
please post your logs with |
One more time thanks.
|
If properly configured the In the config and I believe it will need to be
|
You are completely right, my mistake. I can see now that in the vouch logs this line at the very beginning: |
Nope, I still get the
But the field with the group that is sent back to the protected service is missing. |
hope this is fixed by #183 |
Thanks, I have tried it but I still get the |
Could you post a fresh log with debug and your current nginx conf? I'm
curious about the header syntax VP is suggesting in the logs.
…On Wed, Apr 22, 2020, 7:02 AM Roger Gomez Olivares ***@***.***> wrote:
Thanks, I have tried it but I still get the CustomClaims:map[] empty on
the logs and only the headers for X-Forwarded-Host, X-Vouch-User, and
Cookie related to Vouch. I still don't see the additional header even
though the logs have vouch:map[allowallusers:true domains:[
dev.myexample.com] headers:map[claims:[cognito:groups]]
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#221 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAJUV26SCR6GRKMNGNWBF5TRN32FZANCNFSM4LD4WPBA>
.
|
@rogerscuall any progress on this one? If you are no longer working this issue could you please close it. |
Describe the problem
After the user was authenticated and can go to the protected service, the only information we have about the user is the header x-vouch-user. Can we get any other information assuming the external provider is sending that information?
Expected behavior
In this specific case, other information is requested, for scope is: OpenID, email, profile.
The auth response header is just x-vouch-user per the example in the main page:
nginx.ingress.kubernetes.io/auth-response-headers: x-vouch-user
But I'm looking for any other information that we can pass to the protected service, for example, the email or the profile.
Additional context
For testing purposes right now the protected service is httpbin and I'm getting the following headers:
https://hastebin.com/eyiroviyax.bash
The text was updated successfully, but these errors were encountered: