-
-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
oidc: hydra as federated user auth for AWS Console/API #315
Labels
rfc
A request for comments to discuss and share ideas.
Comments
Currently on the run, but I don't think the oidc thumbprint is currently
implemented. I'm open though to have that feature in Hydra, especially
because it's a standard. I'll check the spec when I'm home.
What would be even more awesome is a PR. You can ping me in gitter if
you want to tackle it!
Am 01.12.2016 um 17:22 schrieb SonOfBytes:
…
I'm looking to do a spike in using hydra as an ECS service that
provides AWS Console/API federated services using Open Connect ID.
http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html
The first hurdle I hit was that it appears the when setting up an
identity provider in AWS for Open Connect ID that it is hitting
|/.well-known/openid-configuration|
This seems to be requesting a Thumbprint for the OIDC IDP
http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc_verify-thumbprint.html
What is the best suggested way of delivering the requested thumbprint
using hydra?
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#315>, or mute the thread
<https://github.com/notifications/unsubscribe-auth/ADN1epj4gX9lr-dzk-uJ_U17CP8rbn5aks5rDvRMgaJpZM4LBl1F>.
|
I'm quite new to iidc and hydra - so I'll probably have the fog of ignorance to work through :P Looking at a sample else where this appears to be the broad format
|
Jup that looks about right, still going to need the jwks discovery, which should also sort of look like this document (but point to the jwk sets instead) |
aeneasr
changed the title
Hydra as federated user auth for AWS Console/API
oidc: hydra as federated user auth for AWS Console/API
Dec 13, 2016
this is now implemented |
aeneasr
added
rfc
A request for comments to discuss and share ideas.
and removed
request
labels
Aug 20, 2020
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
I'm looking to do a spike in using hydra as an ECS service that provides AWS Console/API federated services using Open Connect ID.
http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html
The first hurdle I hit was that it appears the when setting up an identity provider in AWS for Open Connect ID that it is hitting
/.well-known/openid-configuration
This seems to be requesting a Thumbprint for the OIDC IDP
http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc_verify-thumbprint.html
What is the best suggested way of delivering the requested thumbprint using hydra?
The text was updated successfully, but these errors were encountered: