-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
oidc-connect plugin, and restricting access to endpoints using scope
#10352
Comments
scope
(client_credentials)
scope
(client_credentials)scope
Consolidating #10454 (comment) into this thread. OP mentioned they have customized the @csotiriou I was wondering if you have explored authz-keycloak plugin and tried setting the |
Hello, I have considered it yes - however, for standardization's sake, we want to use the openid-connect (plus I stumbled across other issues as well that I may mention in another thread when I make sure that I have the correct configuration). I believe that the scope-based approach is more generic than having to resort to putting the permissions attribute in the token. |
I took the liberty of making a PR out of this, here: #10493. I hope you find this useful. |
Description
Hello, I am using the Ingress Controller and I am trying to support the following scenario using OIDC
All of them should be of type "client_credentials"
And on top of a test route, I have the following definition:
I am using the OIDC plugin and Keycloak as my authentication provider. Although APISIX can provide access to the endpoints, with tokens accessed it fails to deny access to clients that don't have the required scope. No matter what scope I put in the
scope
parameter, it always allows anyone with a valid token (but without a scope) to access the route. Perhaps this is a relevant issue: #1272Therefore, I have two questions:
The text was updated successfully, but these errors were encountered: