Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improve Kerberos-based auth experience #27527

Open
mkArtakMSFT opened this issue Nov 4, 2020 · 4 comments
Open

Improve Kerberos-based auth experience #27527

mkArtakMSFT opened this issue Nov 4, 2020 · 4 comments
Assignees
Labels
area-auth Includes: Authn, Authz, OAuth, OIDC, Bearer design-proposal This issue represents a design proposal for a different issue, linked in the description enhancement This issue represents an ask for new feature or an enhancement to an existing one Theme: meeting developer expectations
Milestone

Comments

@mkArtakMSFT
Copy link
Member

mkArtakMSFT commented Nov 4, 2020

Summary

We've seen some feedback indicating that Kerberos auth is not usable in some E2E scenarios (@Tratcher can you please clarify this as none of the attendees of the meeting have context about this).
This issue tracks the work to identify all those experiences and later decide which ones we would like to address in 6.0 timeframe.

@blowdart thinks that this may be related to authentication delegation to SQL.

People with more context

@Tratcher, @JunTaoLuo

Motivation and goals

The initial 3.x Negotiate handler provided only minimal functionality on linux. In 5.0 @JunTaoLuo did work to expand that to include roles. However, none of the partners have been able to validate the new 5.0 features yet, so we're still expecting feedback that we may need to address.

We're also still waiting for a proper Negotiate API from the runtime. We've been using reflection since 3.x. dotnet/runtime#29270

There have also been asks about delegating to SQL cross platform.

In scope

A list of major scenarios, perhaps in priority order.

Out of scope

Scenarios you explicitly want to exclude.

Risks / unknowns

How might developers misinterpret/misuse this? How might implementing it restrict us from other enhancements in the future? Also list any perf/security/correctness concerns.

Examples

Give brief examples of possible developer experiences (e.g., code they would write).

Don't be deeply concerned with how it would be implemented yet. Your examples could even be from other technology stacks.

@mkArtakMSFT mkArtakMSFT added enhancement This issue represents an ask for new feature or an enhancement to an existing one design-proposal This issue represents a design proposal for a different issue, linked in the description Theme: meeting developer expectations labels Nov 4, 2020
@mkArtakMSFT mkArtakMSFT added this to the Next sprint planning milestone Nov 4, 2020
@ghost
Copy link

ghost commented Nov 4, 2020

Thanks for contacting us.
We're moving this issue to the Next sprint planning milestone for future evaluation / consideration. We will evaluate the request when we are planning the work for the next milestone. To learn more about what to expect next and how this issue will be handled you can read more about our triage process here.

@Tratcher Tratcher assigned blowdart and unassigned Tratcher Nov 6, 2020
@Pilchie Pilchie added the area-auth Includes: Authn, Authz, OAuth, OIDC, Bearer label Dec 15, 2020
@adityamandaleeka
Copy link
Member

@blowdart Looks like this hasn't been addressed for a couple of years. Is this something we want to invest in for 8 or should we just close it?

@mkArtakMSFT mkArtakMSFT modified the milestones: .NET 7 Planning, Backlog Nov 17, 2022
@ghost
Copy link

ghost commented Nov 17, 2022

We've moved this issue to the Backlog milestone. This means that it is not going to be worked on for the coming release. We will reassess the backlog following the current release and consider this item at that time. To learn more about our issue management process and to have better expectation regarding different types of issues you can read our Triage Process.

@mkArtakMSFT
Copy link
Member Author

mkArtakMSFT commented Nov 17, 2022

Moving to Backlog until the decision is made.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area-auth Includes: Authn, Authz, OAuth, OIDC, Bearer design-proposal This issue represents a design proposal for a different issue, linked in the description enhancement This issue represents an ask for new feature or an enhancement to an existing one Theme: meeting developer expectations
Projects
None yet
Development

No branches or pull requests

5 participants