[ 
https://issues.apache.org/jira/browse/SOLR-12121?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16604997#comment-16604997
 ] 

Jan Høydahl commented on SOLR-12121:
------------------------------------

Pushed new commits to PR:
 * Support for well-known opened-connect config endpoint
 ** This will configure {{jwkUrl}} automatically and also set {{iss}} from the 
config
 * Support for {{clientId}} config, which will automatically set {{aud}} config 
to require cliendId as audience
 * Support for {{scope}} config, with a list of valid scopes. If access token 
does not contain any of them, the request fails
 * Use camelCase for param names, as for BasicAuth, e.g. {{blockUnknown}} 
instead of {{block_unknown}}
 * Validate config and fail if unknown params given
 * Enable config-edit API, using {{set-property}} 
 * Provide an introspection spec
 * Update refGuide
 * Cleaned up tests

So far I'm documenting that there is *no* support for setting JWT header from 
SolrJ, and no support for using bin/solr with a JWT auth enabled cluster. I'll 
tackle that in followup issues.

> JWT Authentication plugin
> -------------------------
>
>                 Key: SOLR-12121
>                 URL: https://issues.apache.org/jira/browse/SOLR-12121
>             Project: Solr
>          Issue Type: New Feature
>      Security Level: Public(Default Security Level. Issues are Public) 
>          Components: Authentication
>            Reporter: Jan Høydahl
>            Assignee: Jan Høydahl
>            Priority: Major
>             Fix For: master (8.0)
>
>         Attachments: image-2018-08-27-13-04-04-183.png
>
>          Time Spent: 10m
>  Remaining Estimate: 0h
>
> A new Authentication plugin that will accept a [Json Web 
> Token|https://en.wikipedia.org/wiki/JSON_Web_Token] (JWT) in the 
> Authorization header and validate it by checking the cryptographic signature. 
> The plugin will not perform the authentication itself but assert that the 
> user was authenticated by the service that issued the JWT token.
> JWT defined a number of standard claims, and user principal can be fetched 
> from the {{sub}} (subject) claim and passed on to Solr. The plugin will 
> always check the {{exp}} (expiry) claim and optionally enforce checks on the 
> {{iss}} (issuer) and {{aud}} (audience) claims.
> The first version of the plugin will only support RSA signing keys and will 
> support fetching the public key of the issuer through a [Json Web 
> Key|https://tools.ietf.org/html/rfc7517] (JWK) file, either from a https URL 
> or from local file.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to