-
Notifications
You must be signed in to change notification settings - Fork 2.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add HashiCorp Vault OpenId Connect and JWT authentication support #13817
Comments
/cc @vsevel |
hello @sberyozkin I do not know how much this use case is widespread, but your thinking makes perfect sense. the main challenge would be effectively maintaining a vult authentication associated to the current security context. right now everything is application scoped. so this would involve some rethinking in the vault extension. but I can see the value of it. |
Hi @vsevel, I was thinking a bit more about it. The fact Vault is application scoped is not really a restriction for an enhancement like this one. You have an internal token authentication method implementation - currently the token is provisioned by the extension itself. The rest will be taken care of by I guess this idea of making sure the user authentication is what scopes the Vault data available to Quarkus is not wide-spread is because, perhaps, it is considered a fairly advanced mechanism - but it would definitely add a new dimension to Quarkus Vault integration :-), and I suppose this feature, if it were to be done, would only apply to a case where the endpoints interact with the vault services directly, the early config source level data acquisition would not apply in this case - but may well complement it Please think about it :-) |
@kdubb, Have you dealt with Vault OpenId Connect authentication ? |
@sberyozkin No, I've only been working on secret engines. Nothing with authentication. |
I might do a draft PR for @vsevel to consider |
Description
See https://www.vaultproject.io/docs/auth/jwt
@vsevel Hi Vincent - what do you think ? adding the direct JWT authentication would be straightforward (the advantage - the secret does not go over the wire), but OIDC code flow is more interesting - this would effectively introduce a multi-tenancy into Quarkus Vault applications - a user logs in into Quarkus (via Vault IDP, maybe indirectly via Keycloak) and the data fetched from Vault would be specific to the current user, if I understand it correctly...
quarkus-oidc
can be used to support the OIDC authenticationAlso CC @lordofthejars
The text was updated successfully, but these errors were encountered: