Skip to content
Discussion options

You must be logged in to vote

@koplandipeter Hi, if the endpoint which must be secured is implemented somewhere else then I can think of introducing a proxy which will interpose over that endpoint. This proxy will manage the authorization code flow itself and will propagate the access token to the target 3rd party endpoint.

This proxy is secured as shown in https://quarkus.io/guides/security-oidc-code-flow-authentication#overview-of-the-oidc-authorization-code-flow-mechanism and then you can propagate the access token as shown for example here:

https://quarkus.io/guides/security-openid-connect-providers#access-provider-services-with-token-propagation

Do you reckon it can work in your case ?

Replies: 2 comments 4 replies

Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
4 replies
@koplandipeter
Comment options

@sberyozkin
Comment options

@koplandipeter
Comment options

@sberyozkin
Comment options

Answer selected by koplandipeter
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
2 participants