JWT Validation configuration broken in RC 1.16 #17886
Labels
theme/operator-usability
Replaces UX. Anything related to making things easier for the practitioner
theme/security
type/bug
Feature does not function as expected
Overview of the Issue
I am very excited about the JWT validation in the upcoming release, and tried out the feature based on the docs.
I have an existing service which is configured to validate tokens from Azure AD and that is working fine. I wanted to move the validation into envoy and out of the service but have hit some hurdles.
This was solved by manually attaching a policy with mesh:read permission to the token set up for the account.
My setup is running in k8s via the helm chart, and the policies are automatically attached to the service token - how do I go about attaching this permission to a service token by default, rather than as a one-off?
JWTProvider config looks like this:
Generated envoy config from a config dump looks like this:
However jwks_cluster does not exist in the envoy configuration at all.
I have not tried out a local jwks as a workaround.
I have verified that the jwks url is trusted and does return a valid jwks.
Do you expect that cluster to be statically configured in proxy-defaults (say) or should it be being received via xds by default?
Relatedly, what happens when there is more than one jwt provider since I would have expected the cluster name to look less constant
Operating system and Environment details
AWS EKS
Consul 1.16-rc1 via helm chart
The text was updated successfully, but these errors were encountered: