-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
let JWT validation call token instrospection #632
Comments
Do we need to store local data in Couper for this? E.g. a map of tokens and last check? Or a list of revoked tokens? |
In my proposal, in Additionally, revoked tokens (or, again, some identifier) could be stored, to further reduce traffic. |
If token is JWT:
In this case, it would be sufficient to cache only the introspection response's If token is opaque:
In this case, the whole introspection response has to be cached. |
Alternative configuration: jwt "..." {
# ...
introspection {
endpoint = "..." # the introspection endpoint at the authorization server
backend = "..." # or backend {}; for introspection request
ttl = "..." # duration; positive value: cache introspection response, otherwise do not cache
}
} |
Should this be a beta feature ( |
Token introspection is offered by e.g.
|
VSCode: coupergateway/couper-vscode#132 |
Use cases:
This could be achieved by making the JWT validator call the token introspection endpoint at the authorization server.
OAuth2 Token Introspection: RFC 7662
Proposed new attributes for
jwt
block (or for a nestedintrospection
block):There are two
introspection_mode
s:"always"
: validator introspects the token each time it is validated"interval"
: validator uses a cached introspection response OR introspects the token and caches the response for value ofintrospection_interval
.The text was updated successfully, but these errors were encountered: