[ 
https://issues.apache.org/jira/browse/SOLR-13734?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jan Høydahl updated SOLR-13734:
-------------------------------
    Description: 
In some large enterprise environments, there is more than one [Identity 
Provider|https://en.wikipedia.org/wiki/Identity_provider] to issue tokens for 
users. The equivalent example from the public internet is logging in to a 
website and choose between multiple pre-defined IdPs (such as Google, GitHub, 
Facebook etc) in the Oauth2/OIDC flow.

In the enterprise the IdPs could be public ones but most likely they will be 
private IdPs in various networks inside the enterprise. Users will interact 
with a search application, e.g. one providing enterprise wide search, and will 
authenticate with one out of several IdPs depending on their local affiliation. 
The search app will then request an access token (JWT) for the user and issue 
requests to Solr using that token.

The JWT plugin currently supports exactly one IdP. This JIRA will extend 
support for multiple IdPs for access token validation only. To limit the scope 
of this Jira, Admin UI login must still happen to the "primary" IdP. Supporting 
multiple IdPs for Admin UI login can be done in followup issues.

  was:
In some large enterprise environments, there are more than one [Identity 
Provider|https://en.wikipedia.org/wiki/Identity_provider] to issue tokens for 
users. The classic example from the public internet is logging in to a do a 
site and choose between multiple pre-defined IdPs (such as Google, GitHub, 
Facebook etc).

In the enterprise world the IdPs will not be these public providers but IdPs 
inside various networks inside the enterprise.

The JWT plugin currently supports exactly one IdP. This JIRA will in the first 
phase extend support for multiple IdPs for access token validation only, not 
Admin UI login, meaning there will be a "main IdP" and optionally multiple 
"additional IdPs". Admin UI login will be towards main IdP but validation of 
access tokens may be with any of the additional IdPs.


> JWTAuthPlugin to support multiple issuers
> -----------------------------------------
>
>                 Key: SOLR-13734
>                 URL: https://issues.apache.org/jira/browse/SOLR-13734
>             Project: Solr
>          Issue Type: Task
>      Security Level: Public(Default Security Level. Issues are Public) 
>          Components: security
>            Reporter: Jan Høydahl
>            Assignee: Jan Høydahl
>            Priority: Major
>              Labels: JWT, authentication
>
> In some large enterprise environments, there is more than one [Identity 
> Provider|https://en.wikipedia.org/wiki/Identity_provider] to issue tokens for 
> users. The equivalent example from the public internet is logging in to a 
> website and choose between multiple pre-defined IdPs (such as Google, GitHub, 
> Facebook etc) in the Oauth2/OIDC flow.
> In the enterprise the IdPs could be public ones but most likely they will be 
> private IdPs in various networks inside the enterprise. Users will interact 
> with a search application, e.g. one providing enterprise wide search, and 
> will authenticate with one out of several IdPs depending on their local 
> affiliation. The search app will then request an access token (JWT) for the 
> user and issue requests to Solr using that token.
> The JWT plugin currently supports exactly one IdP. This JIRA will extend 
> support for multiple IdPs for access token validation only. To limit the 
> scope of this Jira, Admin UI login must still happen to the "primary" IdP. 
> Supporting multiple IdPs for Admin UI login can be done in followup issues.



--
This message was sent by Atlassian Jira
(v8.3.2#803003)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to