-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enhance OIDC token propagation filters to select named OIDC clients #36458
Comments
/cc @pedroigor (oidc) |
@sberyozkin triage/backport* labels may not be added to an issue. Please add them to the corresponding pull request. This message is automatically generated by a bot. |
I got this enhancement request closed by mistake |
I'll have a look.
@sberyozkin can you give me a hint what you meant by this - how should it be possible to customize exchange token requirement? Or at least what should be possible to do, I just need little context, link or class reference, not much. Thanks |
Hi @michalvavrik OIDC token propagation filter, before propagating the token, can exchange it first, using the token exchange grant or jwt bearer grant, and then will propagate the new token. And it can vary one per client case, for one client the token can be propagated immediately, for another one - after an exchange, but OIDC token propagation config is not multi-tenant, like the OIDC client configuration is... I'll need to refresh my memory, what exactly I meant it can only be of interest to the default client. |
Way I see it when you select |
Hello @michalvavrik, @sberyozkin would it be possible to backport this feature to quarkus 3.8? I see that only one of the two commits is part of the 3.8 release |
I think new features are not eligible for backports, even to LTS. However I'm not the one to decide. Let's see what @sberyozkin things. |
Description
OIDC token propagation filters, before propagating the tokens, can exchange them with the OIDC server to set the correct target service audience, with this token exchange supported by a named OIDC client.
Right now, it is not possible to associate a specific named OIDC client with a specific REST Client annotated with the
@AccessToken
which enabled a token propagation filter for this REST Client, see #36440Implementation ideas
Allow to use
@AccessToken
like this:Similarly to how it can be done for
OidcClientFilter
.Additionally it should be possible to use
@AccessToken
to customize an exchange token requirement when a default client is used as it is not really needed for named clientsThe text was updated successfully, but these errors were encountered: