--
You received this message because you are subscribed to the Google Groups "MicroProfile" group.
To unsubscribe from this group and stop receiving emails from it, send an email to microprofile...@googlegroups.com.
To post to this group, send email to microp...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/microprofile/b2b6f36d-9590-4620-ad95-ddc2d761fb16%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
The primary extension that OpenID Connect makes to OAuth 2.0 to enable End-Users to be Authenticated is the ID Token data structure. The ID Token is a security token that contains Claims about the Authentication of an End-User by an Authorization Server when using a Client, and potentially other requested Claims. The ID Token is represented as a JSON Web Token (JWT) [JWT].
I think the minimum starting use case is that a user has a workflow that involves 2 or more micro services. They are using an IdP to produce a JWT that has a subject and workflow associated roles.What they need is the ability to configure the micro services to:1. accept that JWT is valid. This goes to defining acceptable signatures and encryption. A default implementation of a javax.security.auth.message.module.ServerAuthModule that illustrates this would be needed for a compatibility test.2. Some security configuration definition that allows for the mapping of the subject and workflow roles into the security domains of the containers hosting the micro services.
--
You received this message because you are subscribed to the Google Groups "MicroProfile" group.
To unsubscribe from this group and stop receiving emails from it, send an email to microprofile...@googlegroups.com.
To post to this group, send email to microp...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/microprofile/60a11257-97d5-45be-9332-4142345ebf7a%40googlegroups.com.
public class JWTAuthModule implements ServerAuthModule {
protected CallbackHandler callbackHandler = null;
public AuthStatus validateRequest(MessageInfo messageInfo, Subject clientSubject,
Subject serviceSubject) throws AuthException {
try {
// Get the JWT token
JWTCallback jwtCallback = new JWTCallback(messageInfo);
this.callbackHandler.handle(new Callback[]{jwtCallback});
JWTToken token = jwtCallback.getToken();
// Associate caller principal identity represented by the token with the clientSubject
JWTPrincipalCallback principalCallback = new JWTPrincipalCallback(clientSubject, token);
// Associate the caller roles with the clientSubject
JWTGroupPrincipalCallback groupCallback = new JWTGroupPrincipalCallback(clientSubject, token);
this.callbackHandler.handle(new Callback[]{principalCallback, groupCallback});
// the mapped caller identify
Set<? extends java.security.Principal> caller = clientSubject.getPrincipals(JWTPrincipal.class);
// the mapped caller roles
Set<? extends Group> roles = clientSubject.getPrincipals(JWTGroup.class);
} catch (Exception e) {
}
}
Hi,I think we should start by identifying the key scenarios we want to support, and then work towards the right solutions. As you say many micro services wont need to use OIDC directly, but many (most?) will need to be able to receive information. This aren’t expressed in the right way, so feel free to pick apart, but I think these might be things people need to do, but whether we address all, or a subset should be discussed.* Service A calls service B sending service identity.* Service A calls service B sending user identity.* Service A calls service B sending user identity + authorization info* Service A calls service B sending service identity + authorization info* Service A calls service B sending service identity, and end user identity + authorization info.* Service A calls service B sending service identity + authorization info, and end user identity.* Service A calls service B sending service identity + authorization info, and end user identity + authorization info.
I believe that we do have a public REST API for validating that somebody has an ECA (or is a committer), but I'm waiting on confirmation from the Eclipse webdev team.
I'm curious to learn a bit more about what you're thinking. This may be a good experiment to move us forward with having an "Eclipse MicroProfile" organization on GitHub.
We can move this discussion to a different channel if you'd like.
Wayne
To view this discussion on the web visit https://groups.google.com/d/msgid/microprofile/bc572d5c-2524-419f-b409-349b0a912ce9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
I believe that we do have a public REST API for validating that somebody has an ECA (or is a committer), but I'm waiting on confirmation from the Eclipse webdev team.
I'm curious to learn a bit more about what you're thinking. This may be a good experiment to move us forward with having an "Eclipse MicroProfile" organization on GitHub.
We can move this discussion to a different channel if you'd like.
Wayne
On 30/01/17 01:58 PM, sst...@redhat.com wrote:
John Clingan is going to be starting a discussion on how to get the transition to Eclipse finalized today, and yes, anything new should be under the Eclipse foundation repo. If this cannot be done in short order, we'll see about creating project here an only accepting PRs from ECA signers. Is there a simple rest api for validating an ECA signer status? I know you can see the status from your landing page at accounts.eclipse.org without being logged in, for example mine: