Skip to content

Conversation

@lucacome
Copy link

Using the username header to show that the user is authenticated.

Copy link
Contributor

@pleshakov pleshakov left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@lucacome

looks good!

Would it make sense to update the doc here https://github.com/nginxinc/kubernetes-ingress/blob/master/docs-web/configuration/policy-resource.md#oidc ? Something like below:

spec:
  oidc:
    clientID: nginx-plus
    clientSecret: oidc-secret
    authEndpoint: https://idp.example.com/openid-connect/auth
    tokenEndpoint: https://idp.example.com/openid-connect/token
    jwksURI: https://idp.example.com/openid-connect/certs

NGINX Plus will pass the ID of an authenticated user to the backend in the HTTP header username.

@Dean-Coakley Dean-Coakley merged commit a469c40 into master Jan 20, 2021
@Dean-Coakley Dean-Coakley deleted the improve-oidc-example branch January 20, 2021 12:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants