-
Notifications
You must be signed in to change notification settings - Fork 592
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OIDC client certificate support #21826
Comments
…y JWT client authn For OpenLiberty#21826
… config attributes - Adds the following attributes to the metatype for the `<openidConnectClient>` and `<oidcLogin>` elements: - tokenEndpointAuthSigningAlgorithm - keyAliasName For OpenLiberty#21826
… config attributes - Adds the following attributes to the metatype for the `<openidConnectClient>` and `<oidcLogin>` elements: - tokenEndpointAuthSigningAlgorithm - keyAliasName For OpenLiberty#21826
… config attributes - Adds the following attributes to the metatype for the `<openidConnectClient>` and `<oidcLogin>` elements: - tokenEndpointAuthSigningAlgorithm - keyAliasName For OpenLiberty#21826
… config attributes - Adds the following attributes to the metatype for the `<openidConnectClient>` and `<oidcLogin>` elements: - tokenEndpointAuthSigningAlgorithm - keyAliasName For OpenLiberty#21826
…uthentication - Adds logic to the OIDC token endpoint request code to add `private_key_jwt` related parameters when using that token endpoint auth method - Adds a large part of the logic to the `PrivateKeyJwtAuthMethod` class to create the JWT for client authentication - Note: Still missing logic to obtain the key itself using the keyAliasName For OpenLiberty#21826
…uthentication - Adds logic to the OIDC token endpoint request code to add `private_key_jwt` related parameters when using that token endpoint auth method - Adds a large part of the logic to the `PrivateKeyJwtAuthMethod` class to create the JWT for client authentication - Note: Still missing logic to obtain the key itself using the keyAliasName For OpenLiberty#21826
…uthentication - Adds logic to the OIDC token endpoint request code to add `private_key_jwt` related parameters when using that token endpoint auth method - Adds a large part of the logic to the `PrivateKeyJwtAuthMethod` class to create the JWT for client authentication - Note: Still missing logic to obtain the key itself using the keyAliasName For OpenLiberty#21826
Adds logic for retrieving the private key to use from the configured keystore. For OpenLiberty#21826
UFO review - 2023-05-01
|
Interop testing maybe for SVT? |
Feature Test Summary: #25323 |
The information to document the feature is in OpenLiberty/docs#6689 . Approving this epic. |
@OpenLiberty/demo-approvers Demo scheduled for EOI 23.14. |
@OpenLiberty/serviceability-approvers UFO: Does the UFO identify the most likely problems customers will see and identify how the feature will enable them to diagnose and solve those problems without resorting to raising a PMR? Have these issues been addressed in the implementation? Yes, the Serviceability slide covers the common error scenarios, and I've written and confirmed several new NLS messages that cover the problematic scenarios. Test and Demo: As part of the serviceability process we're asking feature teams to test and analyze common problem paths for serviceability and demo those problem paths to someone not involved in the development of the feature (eg. L2, test team, or another development team). a) What problem paths were tested and demonstrated? b) Who did you demo to? c) Do the people you demo'd to agree that the serviceability of the demonstrated problem scenarios is sufficient to avoid PMRs for any problems customers are likely to encounter, or that L2 should be able to quickly address those problems without need to engage L3? a) Problem paths tested/demonstrated:
b) Demonstrated to testing team (Chris Crane) c) Yes, serviceability needs are believed to have been met SVT: SVT team is often the first team to try new features and often encounters problems setting up and using them. Note that we're not expecting SVT to do full serviceability testing -- just to sign-off on the serviceability of the problem paths they encountered. a) Who conducted SVT tests for this feature? b) Do they agree that the serviceability of the problems they encountered is sufficient to avoid PMRs, or that L2 should be able to quickly address those problems without need to engage L3? There was no SVT needed for this feature. Service: Which L2 / L3 queues will handle PMRs for this feature? Ensure they are present in the contact reference file and in the queue contact summary, and that the respective L2/L3 teams know they are supporting it. Ask Don Bourne if you need links or more info. WAS L2: SEC Metrics: Does this feature add any new metrics or emit any new JSON events? If yes, have you updated the JMX metrics reference list / Metrics reference list / JSON log events reference list in the Open Liberty docs? N/A |
@OpenLiberty/ste-approvers STE slides uploaded to the STE archive. |
Description
Request to support RP using a certificate rather than clientSecret for callbacks to the OP. Specific use case would be AzureAD. The OpenID [Specification](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication private_key_jwt)
Documents
When available, add links to required feature documents. Use "N/A" to mark particular documents which are not required by the feature.
Process Overview
General Instructions
The process steps occur roughly in the order as presented. Process steps occasionally overlap.
Each process step has a number of tasks which must be completed or must be marked as not applicable ("N/A").
Unless otherwise indicated, the tasks are the responsibility of the Feature Owner or a Delegate of the Feature Owner.
If you need assistance, reach out to the OpenLiberty/release-architect.
Important: Labels are used to trigger particular steps and must be added as indicated.
Prioritization (Complete Before Development Starts)
The (OpenLiberty/chief-architect) and area leads are responsible for prioritizing the features and determining which features are being actively worked on.
Prioritization
Design (Complete Before Development Starts)
Design preliminaries determine whether a formal design, which will be provided by an Upcoming Feature Overview (UFO) document, must be created and reviewed. A formal design is required if the feature requires any of the following: UI, Serviceability, SVT, Performance testing, or non-trivial documentation/ID.
Design Preliminaries
ID Required
, if non-trivial documentation needs to be created by the ID team.ID Required - Trivial
, if no design will be performed and only trivial ID updates are needed.Design
Design Review Request
Design Approved
No Design
No Design Approval Request
No Design Approved
FAT Documentation
Implementation
A feature must be prioritized before any implementation work may begin to be delivered (inaccessible/no-ship). However, a design focused approach should still be applied to features, and developers should think about the feature design prior to writing and delivering any code.
Besides being prioritized, a feature must also be socialized (or No Design Approved) before any beta code may be delivered. All new Liberty content must be inaccessible in our GA releases until it is Feature Complete by either marking it
kind=noship
or beta fencing it.Code may not GA until this feature has obtained the "Design Approved" or "No Design Approved" label, along with all other tasks outlined in the GA section.
Feature Development Begins
In Progress
labelLegal and Translation
In order to avoid last minute blockers and significant disruptions to the feature, the legal items need to be done as early in the feature process as possible, either in design or as early into the development as possible. Similarly, translation is to be done concurrently with development. Both MUST be completed before Beta or GA is requested.
Legal (Complete before Feature Complete Date)
Translation (Complete 1 week before Feature Complete Date)
Beta
In order to facilitate early feedback from users, all new features and functionality should first be released as part of a beta release.
Beta Code
kind=beta
,ibm:beta
,ProductInfo.getBetaEdition()
target:beta
and the appropriatetarget:YY00X-beta
(where YY00X is the targeted beta version).release:YY00X-beta
(where YY00X is the first beta version that included the functionality).Beta Blog (Complete 1.5 weeks before beta eGA)
GA
A feature is ready to GA after it is Feature Complete and has obtained all necessary Focal Point Approvals.
Feature Complete
target:ga
and the appropriatetarget:YY00X
(where YY00X is the targeted GA version).Focal Point Approvals (Complete by Feature Complete Date)
These occur only after GA of this feature is requested (by adding a
target:ga
label). GA of this feature may not occur until all approvals are obtained.All Features
focalApproved:externals
@OpenLiberty/demo-approvers Demo scheduled for EOI [Iteration Number]
to this issue.focalApproved:demo
.focalApproved:fat
.focalApproved:globalization
.Design Approved Features
focalApproved:accessibility
.focalApproved:id
.focalApproved:performance
.focalApproved:sve
.focalApproved:ste
.focalApproved:svt
.Remove Beta Fencing (Complete by Feature Complete Date)
GA Blog (Complete by Feature Complete Date)
Post GA
target:YY00X
label with the appropriaterelease:YY00X
. (OpenLiberty/release-manager)Other Deliverables
The text was updated successfully, but these errors were encountered: