Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Example config for JWT SSO feature #1964

Closed
Charlotte-Holt opened this issue Jul 15, 2020 · 17 comments
Closed

Example config for JWT SSO feature #1964

Charlotte-Holt opened this issue Jul 15, 2020 · 17 comments
Assignees
Labels
3Q20-next: 35 3Q20 topics for 3Q enhance generated doc Updates required to the generated feature or server config doc. peer reviewed published Docs that have published but still require final editorial review strategist reviewed Laura or Alasdair reviewed and approved the documentation from a content strategy perspective. technical reviewed An SME reviewed and approved the documentation from a technical perspective.
Milestone

Comments

@Charlotte-Holt
Copy link
Contributor

Charlotte-Holt commented Jul 15, 2020

Determine whether there are any commonly used config examples that should go in the JWT SSO feature generated doc. Include the example from #1880. Also see #636 and #571 for related feature examples.

@Charlotte-Holt Charlotte-Holt added enhance generated doc Updates required to the generated feature or server config doc. 3Q20-next: 35 3Q20 topics for 3Q labels Jul 15, 2020
@ManasiGandhi ManasiGandhi added this to the 20.17 (8/10-8/21) milestone Aug 10, 2020
@dmuelle dmuelle modified the milestones: 20.17 (8/10-8/21), 20.19 (9/7-9/18) Aug 31, 2020
@ManasiGandhi
Copy link
Contributor

@teddyjtorres
Copy link

Thank you Manasi. The changes look good. If there is time for more changes:

In the disabling JWT section, "You can disable JWT SSO to avoid a default authentication with the JWT cookie." needs to be clarified since Tthe JWT cookie is still accepted, but will not be generated.

It could be rephrased as "You can enable JWT SSO to accept authentication with an existing JWT cookie without generating it. The following example shows how to disable creating JWT cookies."

Also, the sentence "The disableJwtCookie attribute is set to true for the id attribute sample." could be removed.

@ManasiGandhi
Copy link
Contributor

@teddyjtorres I updated the draft with your suggestions. You can view it here https://draft-openlibertyio.mybluemix.net/docs/20.0.0.10/reference/feature/jwtSso-1.0.html

@teddyjtorres
Copy link

Thank you for the updates. They look good.

@ManasiGandhi ManasiGandhi added the technical reviewed An SME reviewed and approved the documentation from a technical perspective. label Sep 2, 2020
@lauracowen
Copy link
Member

lauracowen commented Sep 4, 2020

Thanks Manasi. Nice job. I just have a couple of questions to clarify some slight ambiguities in the wording that could be interpreted in slightly different ways. But otherwise a neat job.

  • Can you end the lead-in sentence to the example with a colon.
  • myBuilder (under first example) should be in monospace.
  • "... is used to identify the JWT builder." - I think this would be clearer as "is the name of the jwtBuilder." or even "...is the name of the token."? Can you check with Teddy that that's an accurate interpretation? If not, can you make it clearer where this value of id comes from?
  • Could you change the wording of the last sentence under the first example slightly to "indicates that the token expiration time is changed to 1800 seconds" - according to the intro of the first example, the point of setting the number of seconds is to change the expiration time of the existing token, rather than to set the expiration time of a new token. I think (can you check with Teddy)?

@ManasiGandhi
Copy link
Contributor

@lauracowen I worked on your suggestions. Couldn't talk to Teddy as he is on a vaction until 14th. Will update the changes once I confirm them with him.

@teddyjtorres
Copy link

Hi,

"... is used to identify the JWT builder." is accurate. This is consistent with the description for "id" in https://www.ibm.com/support/knowledgecenter/en/SSAW57_liberty/com.ibm.websphere.liberty.autogen.nd.doc/ae/rwlp_config_jwtBuilder.html.

When the expiresInSeconds is set, it applies to any new token that is created after the modification. Old tokens will not be modified. Therefore, please reword this sentence,

"The expiresInSeconds attribute indicates the token expiration time is changed to 1800 seconds."

to something like,

"The expiresInSeconds attribute indicates the token expiration time is set to 1800 seconds for a newly generated token."

Thank you for the updates.

@lauracowen
Copy link
Member

@teddyjtorres Thanks for your answers. About the id value, my question was more about whether the value of the id was being set/defined for the token here or was a reference to an id set elsewhere - I think I found that I could read the sentence either way and wanted to be clear where the id value comes from in the first place. I think it's the former (ie the token is being defined here)?

@teddyjtorres
Copy link

Hi Laura. No problem. The id refers to the builder itself and it is not used for the tokens.

Hi Manasi. Thank you for the changes.

@ManasiGandhi
Copy link
Contributor

@lauracowen lauracowen added the strategist reviewed Laura or Alasdair reviewed and approved the documentation from a content strategy perspective. label Oct 21, 2020
@lauracowen
Copy link
Member

Great, thank you. Signing off.

@dmuelle dmuelle added published Docs that have published but still require final editorial review and removed published Docs that have published but still require final editorial review labels Oct 25, 2020
@dmuelle
Copy link
Member

dmuelle commented Oct 27, 2020

@dmuelle dmuelle added the published Docs that have published but still require final editorial review label Oct 27, 2020
@chirp1
Copy link
Contributor

chirp1 commented Nov 17, 2020

Hi Manasi, I don't seem to see an peerl review for the topic. Also, I don't see references to at least instances where you looked up what you are doing in the IBM quality guide. Also, do a another look up in the quality guide for clarity and concreteness. Post that you looked those things up to this issue.

@Charlotte-Holt
Copy link
Contributor Author

Charlotte-Holt commented Nov 19, 2020

@ManasiGandhi Looking good. Peer review feedback:

  • In "The following example shows how you can configure the JWT SSO to change the token expiration time:", I'd remove "the" before "JWT SSO"
  • Suggested update for the first example explanation:

The id attribute of the jwtBuilder element identifies the JWT builder, which is myBuilder in this example. The jwtBuilderRef attribute refers to the myBuilder JWT builder. The expiresInSeconds attribute indicates that the token expiration time is set to 1,800 seconds for a newly generated token.

By default, when a client is authenticated with Open Liberty through the JWT SSO feature, a JWT cookie is created and sent to the HTTP servlet. The following example disables JWT cookies by specifying the disableJwtCookie attribute with a value of true in the server.xml file:
In this example configuration, JWT cookies are disabled, so a mechanism other than JWT cookies can be used for authentication.

It might need to go back to technical review really quick to make sure that this info is accurate.

@ManasiGandhi
Copy link
Contributor

ManasiGandhi commented Nov 20, 2020

@Charlotte-Holt Thanks for reviewing. I worked on your peer review:

  • In "The following example shows how you can configure the JWT SSO to change the token expiration time:", I'd remove "the" before "JWT SSO"

  • Suggested update for the first example explanation:

    The id attribute of the jwtBuilder element identifies the JWT builder, which is myBuilder in this example. The jwtBuilderRef attribute refers to the myBuilder JWT builder. The expiresInSeconds attribute indicates that the token expiration time is set to 1,800 seconds for a newly generated token.

  • I'd change "Disabling JWT cookies" to just "Disable JWT cookies"

  • I think I'd look at the similar example in the SPNEGO feature and try to make it more parallel to this one for consistency (Karen's reviewed the SPNEGO feature). Here's the blog post: https://openliberty.io/blog/2020/07/02/disable-default-cookies-20007.html#JWT-cookie. Something like

  • Think about changing "Configuring JWT SSO to change the token expiration time" to just "Change the token expiration time"

    By default, when a client is authenticated with Open Liberty through the JWT SSO feature, a JWT cookie is created and sent to the HTTP servlet. The following example disables JWT cookies by specifying the disableJwtCookie attribute with a value of true in the server.xml file:
    In this example configuration, JWT cookies are disabled, so a mechanism other than JWT cookies can be used for authentication.

@dmuelle dmuelle removed this from the 20.19 (9/7-9/18) milestone Dec 14, 2020
@dmuelle
Copy link
Member

dmuelle commented Oct 26, 2022

dmuelle added a commit that referenced this issue Aug 28, 2023
@dmuelle dmuelle added this to the 23.0.0.9 milestone Aug 28, 2023
dmuelle added a commit that referenced this issue Sep 8, 2023
This was referenced Sep 8, 2023
@dmuelle
Copy link
Member

dmuelle commented Sep 19, 2023

Edited content is on vNext and will publish with 23.0.0.9. Closing as completed.

@dmuelle dmuelle closed this as completed Sep 19, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
3Q20-next: 35 3Q20 topics for 3Q enhance generated doc Updates required to the generated feature or server config doc. peer reviewed published Docs that have published but still require final editorial review strategist reviewed Laura or Alasdair reviewed and approved the documentation from a content strategy perspective. technical reviewed An SME reviewed and approved the documentation from a technical perspective.
Projects
None yet
Development

No branches or pull requests

6 participants