Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Generic OIDC (i.e., Keycloak) implementation for ServiceX authn/authz #970

Open
wants to merge 8 commits into
base: develop
Choose a base branch
from

Conversation

ponyisi
Copy link
Collaborator

@ponyisi ponyisi commented Feb 24, 2025

Verified to work with UC AF Keycloak.

Admin must specify the OIDC metadata endpoint URI, as well as a client key and secret. This can be done for Globus as well, so there is no forced change to Keycloak.

The admin can set the allowAllAfterAuth config flag to true, which will auto-accept any user that is able to pass through the authentication. This will give a "single sign on"-like experience.

When setup, changes lookups of users to be primarily through email, not through the provider sub claim. This means that a different underlying provider can be used without messing up the user account.

The JWT refresh tokens for requests now use email as the identity, not the sub claim. Therefore all existing tokens need to be regenerated by the users when this version is installed!

This does not yet implement any special admin actions, needs further discussion with @ivukotic about how to implement them.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant