You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We have multi tenancy for the consumer organizations where each organization is part of a different openId realm. So when each consumer calls the API that we publish on 3scale, it only calls with a token from it's own OIDC issuer. However, in apicast configuration it only allows us to add one openID connect issuer so we are not able to validate the tokens of all the consumer organizations. (audiences)
Version
2.7
[provide output of the nginx -V or openresty -V command from openshift/local terminal]
[provide timestamp of the docker image from docker inspect --format='{{.Created}}' quay.io/3scale/apicast:master ]
Steps To Reproduce
Publish any service on 3Scale (Pay attention to openID connect issuer in apicast configuration)
Call the API using the tokens you got from two diffrent oIDC issuers (realms in redhat SSO)
The call doesn't go through as oissuer doesn't match
Current Result
401 error
Expected Result
We are trying to find out if 3Scale can authenticate even if we have consumer organizations in diffrent redhat SSO realms and still expect the calls to work
Additional Information
[Gist with minimal reproducible configuration, see guidelines for contributing for details]
[Gist with nginx log output]
The text was updated successfully, but these errors were encountered:
pritish-nitb
changed the title
We need separate authentication(different OIDC issuers) for separate Consumer Organization
We need separate authentication(different OIDC issuers) for diffrent Consumer Organizations(audience)
Apr 25, 2022
pritish-nitb
changed the title
We need separate authentication(different OIDC issuers) for diffrent Consumer Organizations(audience)
We need separate authentication(different OIDC issuers) for different Consumer Organizations(audience)
Apr 25, 2022
@pritish-nitb, 3scale only supports one OpenId Connect issuer endpoint per facade API product. This would be therefore an RFE; one particularly challenging to implement IMO if extended to other components of the API management system such as 3scale/porta and 3scale/zync, which usually handle the synchronisation of the clients in Red Hat SSO.
@guicassolato Would it be possible to write a custom authentication policy that authenticates the token and returns the response in required format? We have a similar requirement where there are two IDPs, one of them is RH SSO and other one is custom.
We have multi tenancy for the consumer organizations where each organization is part of a different openId realm. So when each consumer calls the API that we publish on 3scale, it only calls with a token from it's own OIDC issuer. However, in apicast configuration it only allows us to add one openID connect issuer so we are not able to validate the tokens of all the consumer organizations. (audiences)
Version
2.7
[provide output of the
nginx -V
oropenresty -V
command from openshift/local terminal][provide timestamp of the docker image from
docker inspect --format='{{.Created}}' quay.io/3scale/apicast:master
]Steps To Reproduce
Current Result
401 error
Expected Result
We are trying to find out if 3Scale can authenticate even if we have consumer organizations in diffrent redhat SSO realms and still expect the calls to work
Additional Information
The text was updated successfully, but these errors were encountered: