Actions
Feature #17038
open[controller] Option to request additional scopes, and verify additional claims, during OpenID Connect auth
Story points:
-
Release:
Release relationship:
Auto
Description
Something like this:
OpenIDConnect:
# ...
# Send additional scope values (along with "openid") in order to request additional claims. Space-separated, case sensitive.
RequestScopes: "profile email"
# Verify that the following claims are returned by the provider (and not empty); otherwise, refuse login. Space-separated, case sensitive.
RequireClaims: ""
PA comments¶
my understanding was that the flow was something like this:
- client sends user to login, and asks for a list of scopes. We could define scopes associated with arvados clusters as "arvados:clusterid" eg arvados:su92l"
- User agrees to the scopes (or not)
- List of scopes are stored as part of the token
- The consumer of the token can check for a specific scope to see if the user authorized a given action
- some scopes are special and defined in the spec because they affect the behavior of the OIDC APIs
- token issuers can restrict the ability to request scopes by client id, so that e.g. mycoolwebsite.com wouldn't be able to get a token that has the "arvados:su92l" scope unless the provider granted permission to do so to mycoolwebsite.com's client id.
We need a new config knob for which scope(s) we require when accepting tokens that were issued for other clients.
Related issues
Updated by Tom Clegg almost 4 years ago
- Related to Feature #16669: Accept OpenID Connect access token added
Updated by Peter Amstutz over 3 years ago
- Release set to 39
- Target version set to 2021-06-09 sprint
Updated by Peter Amstutz over 3 years ago
- Release deleted (
39) - Target version deleted (
2021-06-09 sprint) - Description updated (diff)
Actions