2019-12-20 14:27:45 +08:00
|
|
|
<!--
|
|
|
|
#
|
|
|
|
# Licensed to the Apache Software Foundation (ASF) under one or more
|
|
|
|
# contributor license agreements. See the NOTICE file distributed with
|
|
|
|
# this work for additional information regarding copyright ownership.
|
|
|
|
# The ASF licenses this file to You under the Apache License, Version 2.0
|
|
|
|
# (the "License"); you may not use this file except in compliance with
|
|
|
|
# the License. You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
#
|
|
|
|
-->
|
|
|
|
|
2020-08-12 22:54:11 +08:00
|
|
|
- [中文](../zh-cn/plugins/openid-connect.md)
|
|
|
|
|
2019-12-20 14:27:45 +08:00
|
|
|
# Summary
|
|
|
|
|
|
|
|
- [**Name**](#name)
|
|
|
|
- [**Attributes**](#attributes)
|
|
|
|
- [**Token Introspection**](#token-introspection)
|
|
|
|
|
|
|
|
## Name
|
|
|
|
|
|
|
|
The OAuth 2 / Open ID Connect(OIDC) plugin provides authentication and introspection capability to APISIX.
|
|
|
|
|
|
|
|
## Attributes
|
|
|
|
|
2020-09-23 08:11:27 +08:00
|
|
|
| Name | Type | Requirement | Default | Valid | Description |
|
|
|
|
| ---------------------------------- | ------- | ----------- | --------------------- | ------- | ---------------------------------------------------------------------------------------------- |
|
|
|
|
| client_id | string | required | | | OAuth client ID |
|
|
|
|
| client_secret | string | required | | | OAuth client secret |
|
|
|
|
| discovery | string | required | | | URL of the discovery endpoint of the identity server |
|
|
|
|
| scope | string | optional | "openid" | | Scope used for the authentication |
|
|
|
|
| realm | string | optional | "apisix" | | Realm used for the authentication |
|
|
|
|
| bearer_only | boolean | optional | false | | Setting this `true` will check for the authorization header in the request with a bearer token |
|
|
|
|
| logout_path | string | optional | "/logout" | | |
|
|
|
|
| redirect_uri | string | optional | "ngx.var.request_uri" | | |
|
|
|
|
| timeout | integer | optional | 3 | [1,...] | |
|
|
|
|
| ssl_verify | boolean | optional | false | | |
|
|
|
|
| introspection_endpoint | string | optional | | | URL of the token verification endpoint of the identity server |
|
|
|
|
| introspection_endpoint_auth_method | string | optional | "client_secret_basic" | | Authentication method name for token introspection |
|
|
|
|
| public_key | string | optional | | | The public key to verify the token |
|
|
|
|
| token_signing_alg_values_expected | string | optional | | | Algorithm used to sign the token |
|
2019-12-20 14:27:45 +08:00
|
|
|
|
|
|
|
### Token Introspection
|
|
|
|
|
|
|
|
Token introspection helps to validate a request by verifying the token against an Oauth 2 authorization server.
|
|
|
|
As prerequisite, you should create a trusted client in the identity server and generate a valid token(JWT) for introspection.
|
|
|
|
The following image shows an example(successful) flow of the token introspection via the gateway.
|
|
|
|
|
|
|
|
![token introspection](../images/plugin/oauth-1.png)
|
|
|
|
|
|
|
|
The following is the curl command to enable the plugin to an external service.
|
|
|
|
This route will protect `https://httpbin.org/get`(echo service) by introspecting the token provided in the header of the request.
|
|
|
|
|
|
|
|
```bash
|
2020-03-05 14:48:27 +08:00
|
|
|
curl http://127.0.0.1:9080/apisix/admin/routes/5 -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -d '
|
2019-12-20 14:27:45 +08:00
|
|
|
{
|
|
|
|
"uri": "/get",
|
|
|
|
"plugins": {
|
|
|
|
"proxy-rewrite": {
|
|
|
|
"scheme": "https"
|
|
|
|
},
|
|
|
|
"openid-connect": {
|
|
|
|
"client_id": "api_six_client_id",
|
|
|
|
"client_secret": "client_secret_code",
|
|
|
|
"discovery": "full_URL_of_the_discovery_endpoint",
|
|
|
|
"introspection_endpoint": "full_URL_of_introspection_endpoint",
|
|
|
|
"bearer_only": true,
|
|
|
|
"realm": "master",
|
|
|
|
"introspection_endpoint_auth_method": "client_secret_basic"
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"upstream": {
|
|
|
|
"type": "roundrobin",
|
|
|
|
"nodes": {
|
|
|
|
"httpbin.org:443": 1
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
```
|
|
|
|
|
|
|
|
The following command can be used to access the new route.
|
|
|
|
|
|
|
|
```bash
|
|
|
|
curl -i -X GET http://127.0.0.1:9080/get -H "Host: httpbin.org" -H "Authorization: Bearer {replace_jwt_token}"
|
|
|
|
```
|
|
|
|
|
2020-03-15 20:40:10 +08:00
|
|
|
#### Introspecting with public key
|
|
|
|
|
|
|
|
You can also provide the public key of the JWT token to verify the token. In case if you have provided a public key and
|
|
|
|
a token introspection endpoint, the public key workflow will be executed instead of verifying with the identity server.
|
|
|
|
This method can be used if you want to reduce additional network calls and to speedup the process.
|
|
|
|
|
|
|
|
The following configurations shows how to add a public key introspection to a route.
|
|
|
|
|
|
|
|
```bash
|
|
|
|
curl http://127.0.0.1:9080/apisix/admin/routes/5 -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -d '
|
|
|
|
{
|
|
|
|
"uri": "/get",
|
|
|
|
"plugins": {
|
|
|
|
"proxy-rewrite": {
|
|
|
|
"scheme": "https"
|
|
|
|
},
|
|
|
|
"openid-connect": {
|
|
|
|
"client_id": "api_six_client_id",
|
|
|
|
"client_secret": "client_secret_code",
|
|
|
|
"discovery": "full_URL_of_the_discovery_endpoint",
|
|
|
|
"bearer_only": true,
|
|
|
|
"realm": "master",
|
|
|
|
"token_signing_alg_values_expected": "RS256",
|
|
|
|
"public_key" : "-----BEGIN CERTIFICATE-----
|
|
|
|
{public_key}
|
|
|
|
-----END CERTIFICATE-----"
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"upstream": {
|
|
|
|
"type": "roundrobin",
|
|
|
|
"nodes": {
|
|
|
|
"httpbin.org:443": 1
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}'
|
|
|
|
```
|
|
|
|
|
2019-12-20 14:27:45 +08:00
|
|
|
## Troubleshooting
|
|
|
|
|
2020-02-28 08:46:42 +08:00
|
|
|
Check/modify the DNS settings (`conf/config.yaml) if APISIX cannot resolve/connect to the identity provider.
|