-
Notifications
You must be signed in to change notification settings - Fork 3.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add JWT claims as extra credentials #22944
base: master
Are you sure you want to change the base?
Conversation
Thank you for your pull request and welcome to the Trino community. We require contributors to sign our Contributor License Agreement, and we don't seem to have you on file. Continue to work with us on the review and improvements in this PR, and submit the signed CLA to [email protected]. Photos, scans, or digitally-signed PDF files are all suitable. Processing may take a few days. The CLA needs to be on file before we merge your changes. For more information, see https://github.com/trinodb/cla |
Thank you for your pull request and welcome to the Trino community. We require contributors to sign our Contributor License Agreement, and we don't seem to have you on file. Continue to work with us on the review and improvements in this PR, and submit the signed CLA to [email protected]. Photos, scans, or digitally-signed PDF files are all suitable. Processing may take a few days. The CLA needs to be on file before we merge your changes. For more information, see https://github.com/trinodb/cla |
Can you tell us more about your use case? |
Thanks @wendigo, To confirm do you mean adding an Thanks as well @electrum! While adopting JWT authentication for Trino ( docs ) we found the default |
@raj-manvar we need to understand the use-case first ("why" is more important than "how") |
Also see #15669 to learn of issues with using claims from JWTs received during authentication. |
Thanks @wendigo! yes I can add more context here. We use the standard SPIFFE/SPIRE for generation of the ID tokens to be auth with Trino. While spire has great support for authentication, it's not sufficient for authorization. Thanks @hashhar The issue you linked seems for the oauth https://trino.io/docs/current/security/oauth2.html, the current issue is more around JWT auth https://trino.io/docs/current/security/jwt.html if I understand correctly |
Hi @wendigo checking in if this usecase is generic enough to add a solution to opensource Trino or if you feel this should be done later / some other way. |
This pull request has gone a while without any activity. Tagging the Trino developer relations team: @bitsondatadev @colebow @mosabua |
Please let me know if more info or updates required for the MR! 🙏 |
Hello all, following up again. Any feedback will be useful here. even if this can't be added to Trino now or in future, knowing that would be useful to evaluate if we should start exploring other ways for access control for our usecase :) |
@cla-bot check |
The cla-bot has been summoned, and re-checked this pull request! |
@raj-manvar we were discussing this offline and came to the conclusion that we need additional fields in the extra-credentials is not the right carrier for this since it's considered secret and can also be overridden by clients which can lead to issues if the authorization system does not verify the information passed through there. Another reason to add the information to We'll get back to you once we have more clarity on how the new |
Thanks @hashhar for the update! Makes complete sense :) |
This pull request has gone a while without any activity. Tagging the Trino developer relations team: @bitsondatadev @colebow @mosabua |
Checking in for any updates. Removed the stale label |
I'm copying some offline discussion here so that we can continue discussing this with @electrum / @dain. Praveen Krishna Dain Sundstrom Praveen Krishna Dain Sundstrom David Phillips Dain Sundstrom |
This pull request has gone a while without any activity. Tagging for triage help: @mosabua |
Closing this pull request, as it has been stale for six weeks. Feel free to re-open at any time. |
Description
This is for handling #22943 and adds the JWT claims as extraCredentials to the Identity class
Additional context and related issues
Release notes
( ) Release notes are required. Please propose a release note for me.