Skip to content

Conversation

@tvernum
Copy link
Contributor

@tvernum tvernum commented Nov 11, 2025

OpenID Connect is a protocol for authenticating interactive users. However, because identity platforms that support OIDC often support other protocols that can be used for non-interactive users, it is common for readers to end up on the OIDC page looking for ways to authenticate non-interactive users.

The docs attempt to correct this misconception by refering to a "web application" but that was easy to miss. This change makes it more explicit that OIDC is not a viable option for service authentication and recommends JWT instead.

OpenID Connect is a protocol for authenticating interactive users.
However, because identity platforms that support OIDC often support
other protocols that can be used for non-interactive users, it is
common for readers to end up on the OIDC page looking for ways to
authenticate non-interactive users.

The docs attempt to correct this misconception by refering to a
"web application" but that was easy to miss. This change makes it more
explicit that OIDC is not a viable option for service authentication
and recommends JWT instead.
@tvernum tvernum requested a review from ankit--sethi November 11, 2025 04:39
@tvernum tvernum requested a review from a team as a code owner November 11, 2025 04:39
@github-actions
Copy link

github-actions bot commented Nov 11, 2025

🔍 Preview links for changed docs

Copy link
Contributor

@yetanothertw yetanothertw left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for your contribution! 🪴

I've approved the PR and left 2 minor suggestions for style and clarity for your consideration.


::::{note}
The OpenID Connect protocol enables authentication for interactive users via a web browser. Users must be able to open a login URL in their browser and enter credentials when prompted.
{{es}} does not support using OpenID Connect to authenticate non-interactive users such as service principals or automated processes. If you wish to authenticate a service, the [JWT](jwt.md) realm may be a suitable alternative.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggestion: it might help to clarify that the JWT realm does (or at least, can) leverage the customer's existing OpenID Provider as the source of signed JWTs and provides the PKI for verifying said JWTs?

My sense from the SDHs we have had is that customers tend to think "JWT realm" is something alien that will take them away from the comfort and familiarity of their Entra, Okta, etc setups. They're not seeing their infra fitting into the picture.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Probably. I struggled to come up with the right words that were succinct enough but didn't over promise.

Whether JWT actually
a. works with their existing infrastructure
b. solves their problem
is hard to predict. It probably does, but that requires more words than we want to put here.

Do you have suggested words?
In the end all it really needs to prompt is "Really, please follow that link and go read that page and hopefully it will all make sense to you" but I don't think we want to write that.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"If you wish to authenticate a service, the JWT realm (which can integrate with tokens issued by an Open ID Provider) may be a suitable alternative. "

is what I can come up with. If we don't like parentheses, we can probably re-arrange it a bit!

Copy link
Collaborator

@shainaraskas shainaraskas left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

couple of small grammar suggestions for the changed content

The OpenID Connect realm is designed to allow users to authenticate to {{kib}}. As a result, most sections of this guide assume {{kib}} is used. This section describes how a custom web application could use the relevant OpenID Connect REST APIs to authenticate the users to {{es}} with OpenID Connect.

::::{note}
The OpenID Connect protocol enables authentication for interactive users via a web browser. Users must be able to open a login URL in their browser and enter credentials when prompted.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
The OpenID Connect protocol enables authentication for interactive users via a web browser. Users must be able to open a login URL in their browser and enter credentials when prompted.
The OpenID Connect protocol enables authentication for interactive users through a web browser. Users must be able to open a login URL in their browser and enter credentials when prompted.


::::{note}
The OpenID Connect protocol enables authentication for interactive users via a web browser. Users must be able to open a login URL in their browser and enter credentials when prompted.
{{es}} does not support using OpenID Connect to authenticate non-interactive users such as service principals or automated processes. If you wish to authenticate a service, the [JWT](jwt.md) realm may be a suitable alternative.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
{{es}} does not support using OpenID Connect to authenticate non-interactive users such as service principals or automated processes. If you wish to authenticate a service, the [JWT](jwt.md) realm may be a suitable alternative.
{{es}} does not support using OpenID Connect to authenticate non-interactive users such as service principals or automated processes. If you want to authenticate a service, the [JWT](jwt.md) realm might be a suitable alternative.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants