OIDC authorization code flow if the protected endpoint is placed somewhere else #38389
-
Hi everyone, Any help would be appreciated. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 4 replies
-
/cc @pedroigor (oidc), @sberyozkin (oidc) |
Beta Was this translation helpful? Give feedback.
-
@koplandipeter Hi, if the endpoint which must be secured is implemented somewhere else then I can think of introducing a proxy which will interpose over that endpoint. This proxy will manage the authorization code flow itself and will propagate the access token to the target 3rd party endpoint. This proxy is secured as shown in https://quarkus.io/guides/security-oidc-code-flow-authentication#overview-of-the-oidc-authorization-code-flow-mechanism and then you can propagate the access token as shown for example here: Do you reckon it can work in your case ? |
Beta Was this translation helpful? Give feedback.
@koplandipeter Hi, if the endpoint which must be secured is implemented somewhere else then I can think of introducing a proxy which will interpose over that endpoint. This proxy will manage the authorization code flow itself and will propagate the access token to the target 3rd party endpoint.
This proxy is secured as shown in https://quarkus.io/guides/security-oidc-code-flow-authentication#overview-of-the-oidc-authorization-code-flow-mechanism and then you can propagate the access token as shown for example here:
https://quarkus.io/guides/security-openid-connect-providers#access-provider-services-with-token-propagation
Do you reckon it can work in your case ?