You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add support for different sub claims for authentication (#5336)
* Add documentation for new sub claim config
* Add new config in rdkafka_conf
* Modify logic based on subclaim name value
* Add unit tests
* Fix style format errors for the modified files
* Add integration tests for sub claim name
* Fix style check for 0126-oauthbearer_oidc
* Add new trivup version 0.15.0 and update the dependency in requirements.txt
* Remove redundant comments
* Update Change log
* Remove the link for PR as GH adds it automatically
* Add validation for subclaim string configuration
* Remove tests as preconditions will already be validated before
* Function should fail agnostic of reason. Corrected the comment
* Modify integration test to fail at configuration finalization
* Fix comment for configuration.md consistency
* Add back the default value for sub_claim_name configuration
* Rebuilt CONFIGURATION.md and fix style check
* Fix style check
* Add unit tests for rd_kafka_conf_validate_str
* Fix style check
Copy file name to clipboardExpand all lines: CHANGELOG.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,3 +1,9 @@
1
+
# librdkafka v2.14.0
2
+
3
+
librdkafka v2.14.0 is a feature release:
4
+
5
+
*[KIP-768](https://cwiki.apache.org/confluence/pages/viewpage.action?pageId=186877575#KIP768:ExtendSASL/OAUTHBEARERwithSupportforOIDC-ClientConfiguration) Extend SASL/OAUTHBEARER to support OIDC claim mapping beyond the default `sub` claim (#5336).
sasl.oauthbearer.scope | * | | | low | Client use this to specify the scope of the access request to the broker. Only used when `sasl.oauthbearer.method` is set to "oidc". <br>*Type: string*
109
109
sasl.oauthbearer.extensions | * | | | low | Allow additional information to be provided to the broker. Comma-separated list of key=value pairs. E.g., "supportFeatureX=true,organizationId=sales-emea".Only used when `sasl.oauthbearer.method` is set to "oidc". <br>*Type: string*
110
110
sasl.oauthbearer.token.endpoint.url | * | | | low | OAuth/OIDC issuer token endpoint HTTP(S) URI used to retrieve token. Only used when `sasl.oauthbearer.method` is set to "oidc". <br>*Type: string*
111
+
sasl.oauthbearer.sub.claim.name | * | | sub | low | JWT claim name to use as the subject (principal) when validating OIDC access tokens. Must be present in the JWT payload with a non-empty value. Should match the broker's `sasl.oauthbearer.sub.claim.name` configuration for consistent authentication. Only used when `sasl.oauthbearer.method` is set to "oidc". <br>*Type: string*
111
112
sasl.oauthbearer.grant.type | * | client_credentials, urn:ietf:params:oauth:grant-type:jwt-bearer | client_credentials | low | OAuth grant type to use when communicating with the identity provider. <br>*Type: enum value*
112
113
sasl.oauthbearer.assertion.algorithm | * | RS256, ES256 | RS256 | low | Algorithm the client should use to sign the assertion sent to the identity provider and in the OAuth alg header in the JWT assertion. <br>*Type: enum value*
113
114
sasl.oauthbearer.assertion.private.key.file | * | | | low | Path to client's private key (PEM) used for authentication when using the JWT assertion. <br>*Type: string*
0 commit comments