-
Notifications
You must be signed in to change notification settings - Fork 2
Add support for the AWS Load Balancer mTLS #470
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
The prototype might be found in #483. There's also an ongoing conversation on different approaches. Blocking this ticket until we hear back from Mission Heroes |
When implementing this, please validate or address the following issues which may allow spoofing users by sending another user's public key in the
When we implemented Istio ingress-gateway TLS termination with
|
Sent a meeting request to @mjnagel and @eddiezane. We need to clarify what is the expected level of support we deliver here - is it a simple Delivery add-on or do we need to provide the full support for it. |
This is the recent change:
|
Other notable changes:
|
Uh oh!
There was an error while loading. Please reload this page.
Summary
As highlighted in keycloak/keycloak#25579, Keycloak doesn't support AWS Load Balancer (ALB) mTLS certificate proxying.
Supporting such a certificate handling requires reading the
x-amzn-mtls-clientcert
that contains URL Encoded, Base64 encoded certificate (so the implementation needs to first, URL decode it to aString
and then performbase64
decoding.This ticket contains the following subtasks:
NginxProxySslClientCertificateLookupFactory
implementation with base64 decoding and overriding headersExisting workaround for Istio
There is a workaround for this issue today, which requires using Envoy Filter. @eddiezane was kind enough to share the implementation:
The text was updated successfully, but these errors were encountered: