You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have a Gateekeper working well with Authorization Code Flow (using access tokens) but would like to also accept Password Credentials Grant (basic auth with user and password)
How
Not sure if this is already supported, but maybe a configuration flag to enable it.
not sure if you know, but right now you can get token with user/password with login handler and then you can pass token to gatekeeper https://gogatekeeper.github.io/gatekeeper/userguide/#endpoints, one more thing there is forward signing mode for gatekeeper, which will automate process of getting access token/refresment on client side for you, you then just have to point application to your client side proxy with HTTP_PROXY variables or use curl -x your_client_side_proxy, additionally with this setup you can use --enable-hmac on client side gatekeeper proxy and server side which will add HMAC signature to request, enhancing security, here is code for generating HMAC https://github.com/gogatekeeper/gatekeeper/blob/master/pkg/utils/utils.go#L440, will update docu with description, but basically it creates HMAC from authz header, body of request, method, host, so when hmac enabled and someone would stole somehow somebody tokens he cannot use it alone to create request, because he would need to sign request
Summary
Enable Basic authentication.
Why?
I have a Gateekeper working well with Authorization Code Flow (using access tokens) but would like to also accept Password Credentials Grant (basic auth with user and password)
How
Not sure if this is already supported, but maybe a configuration flag to enable it.
Additional Information
My configuration
client-id: ...
discovery-url: https://keycloak/realms/master
no-redirects: true
no-proxy: true
enable-uma: true
enable-metrics: true
enable-logging: true
enable-request-id: true
enable-login-handler: true
enable-refresh-tokens: true
enable-logout-redirect: true
listen: :3000
listen-admin: :4000
Gatekeeper is used with nginx ingress, which then redirects to the upstream application if auth_request response is 200:
The text was updated successfully, but these errors were encountered: