Replies: 3 comments 2 replies
-
Transferring from the oauth2 tutorial repo, as this issue is a feature request for the OAuth2 plugin. |
Beta Was this translation helpful? Give feedback.
-
It is not clear to me what specifically is being suggested here. That all scopes under |
Beta Was this translation helpful? Give feedback.
-
The OAuth 2 plugin has so many configurable settings already that I am very reluctant to add "one more flag". When we know the IDP service is Keycloak, the list of scopes can always try to combine the @MarcialRosales any objections? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Is your feature request related to a problem? Please describe.
When enabling the authorization for a confidential Keycloak client, you can define resources, scopes, policies and permissions for each resource and connect/map users or user groups to those permissions. This is the suggested method of configuring Keycloak and enables us to have a very fine-grained authorization policy.
Based on my understanding, unfortunately, RabbitMQ and
rabbitmq_auth_backend_oauth2
plugin expect to find the permissions in the scope at the highest level of a JWT token which matches the client scope.Describe the solution you'd like
There should be a flag that let RabbitMQ admin to configure the
rabbitmq_auth_backend_oauth2
plugin so either the plugin uses the client-scope policies or uses the resource permissions.Describe alternatives you've considered
No response
Additional context
Current expected token structure:
Example RPT token produced by Keycloak:
Beta Was this translation helpful? Give feedback.
All reactions