Skip to content

Commit

Permalink
(from AES) Merge pull request #1619 from datawire/alexgervais/dev/sal…
Browse files Browse the repository at this point in the history
…esforce.access.token

Added allowMalformedAccessToken to allow for non-rfc6750 access_token
  • Loading branch information
Alex Gervais authored Jul 14, 2020
2 parents ed5f227 + c0aa140 commit 6b45d2e
Showing 1 changed file with 4 additions and 2 deletions.
6 changes: 4 additions & 2 deletions docs/topics/using/filters/oauth2.md
Original file line number Diff line number Diff line change
Expand Up @@ -93,8 +93,9 @@ spec:
# OAuth Resource Server settings #
############################################################################

accessTokenValidation: "enum" # optional; default is "auto"
accessTokenJWTFilter: # optional; default is null
allowMalformedAccessToken: bool # optional; default is false
accessTokenValidation: "enum" # optional; default is "auto"
accessTokenJWTFilter: # optional; default is null
name: "string" # required
namespace: "string" # optional; default is the same namespace as the Filter
arguments: JWT-Filter-Arguments # optional
Expand Down Expand Up @@ -256,6 +257,7 @@ Settings that are only valid when `grantType: "AuthorizationCode"`:

### OAuth Resource Server settings

- `allowMalformedAccessToken`: Allow any access token, even if they are not RFC 6750-compliant.
- `accessTokenValidation`: How to verify the liveness and scope of Access Tokens issued by the identity provider. Valid values are either `"auto"`, `"jwt"`, or `"userinfo"`. Empty or unset is equivalent to `"auto"`.
* `"jwt"`: Validates the Access Token as a JWT.
+ By default: It accepts the RS256, RS384, or RS512 signature algorithms, and validates the signature against the JWKS from OIDC Discovery. It then validates the `exp`, `iat`, `nbf`, `iss` (with the Issuer from OIDC Discovery), and `scope` claims: if present, none of the scopes are required to be present. This relies on the identity provider using non-encrypted signed JWTs as Access Tokens, and configuring the signing appropriately
Expand Down

0 comments on commit 6b45d2e

Please sign in to comment.