You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/docs/core/concepts/tenant.mdx
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
- Token Validation
8
8
---
9
9
10
-
A tenant is a logical entity that validates tokens against configured identity providers.
10
+
A tenant is like an identity broker, a logical entity that validates tokens against configured identity providers.
11
11
Each tenant can have multiple unique providers configured to handle different authentication sources.
12
12
13
13
<Callouttitle="Caution"type="warn">
@@ -17,26 +17,26 @@ Each tenant can have multiple unique providers configured to handle different au
17
17
</Callout>
18
18
19
19
**Tenant Provider**:
20
+
20
21
A tenant provider is equivalent to a single identity provider. For example, if you are using Google as an identity provider,
21
22
you need to create a provider for Google.
22
23
23
24
### Illustration
24
25
25
-
Let's walk through an illustration of how a tenant validates tokens in a GitHub Actions workflow:
26
+
Let's walk through an illustration of how a tenant validates tokens a typical user request workflow:
26
27
27
-

28
+

28
29
29
-
When a github action is triggered, it will validate the token against the tenant's provider.
30
30
The workflow is as follows:
31
31
32
-
1. The GitHub Action requests a token from GitHub's token server.
33
-
2. GitHub's token server issues a JWT token and returns it to the GitHub Action.
34
-
3. The GitHub Action sends the JWT token to your server for validation.
35
-
4. Your server forwards the JWT token to UseGrant for verification.
36
-
5. UseGrant extracts the tenant details from the JWT token and checks for a matching configured provider.
37
-
If a match is found, it fetches the provider's public key.
38
-
6. UseGrant verifies the token's integrity by validating the signature, expiration, sub, aud and other security parameters.
39
-
7. UseGrant returns the validation result with token expiration time to your server.
40
-
8. If the token is valid, your server grants access to the GitHub Action, allowing the request to proceed.
41
-
42
-
This is a simple example illustrating how a tenant validates tokens in a GitHub Actions workflow. This logic will be the same for any other server.
32
+
1. The user will request a token from token server or Identity provider.
33
+
The token server issues a JWT token and returns it to the user
34
+
2. The user now sends the JWT token to your server for validation.
35
+
3. Your server sends a request with the JWT token to UseGrant for verification.
36
+
4. UseGrant extracts the provider details from the JWT token and checks for a matching configured provider.
37
+
If a match is found, it fetches the provider's public key from the provider's configuration and verifies the token's integrity by validating the signature, expiration, sub, aud and other security parameters.
38
+
5. UseGrant returns the validation result with token expiration time to your server.
39
+
6. If the token is valid, your server grants access to the user or generates a new temporary token for allowing the
40
+
request to proceed.
41
+
42
+
This is a simple example illustrating how a tenant validates tokens in a typical workflow. This logic will be the same for any other server.
0 commit comments