-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support CEL / template in authenticator validations #1035
Comments
Thank you @martin31821 for your FR. I planned the corresponding functionality for the 0.13.0-alpha release. I personally don't see any dependency to #619. |
BTW, I encourage you joining the community in Discord. That way you can directly participate in the ongoing discussions and influence the future of heimdall. |
That's true, I think the only connection between this and #619 is, that I would require the OIDC to not run any assertions on the issuer. Then I could just have an oidc authenticator and a CEL authorizer. Great software design! |
@martin31821: Is there a reason, why you closed the FR? I personally think it is a pretty good enhancement of the available functionality |
As you said, it's already doable with the CEL authorizer, so implementing #619 should cover it completely, but if you'd be willing to allow CEL checks in the authenticator itself, i'm happy to keep it open. |
The idea with #619 was related to the actual discovery of the relevant endpoints. But you're right, the same information from the discovery endpoint can also be used to assert the issuer. I think however this FR deserves to be addressed on its own. |
Preflight checklist
Describe the background of your feature request
We're building a multi-tenant cloud application which is secured via Keycloak and we're looking into using heimdall to secure our app. Our tenants should be separated by using different keycloak realms (effectively one OpenID provider per tenant), but we do want our users to be able to login to shared services in the app using heimdall.
Describe your idea
Building upon #619, I'd like to extend the validation of authenticator with CEL.
I'm thinking of a configuration like this:
Are there any workarounds or alternatives?
I have, so far not found an alternative for what I'm trying to achieve.
A workaround would be an extra service validating tokens from different realms and unifying these tokens, but I think it wouldn't be a nice solution.
Version
v0.11.0
Additional Context
No response
The text was updated successfully, but these errors were encountered: