trafficserver icon indicating copy to clipboard operation
trafficserver copied to clipboard

access_control plugin with opaque tokens + client JWT assertion

Open mst opened this issue 1 year ago • 1 comments

My use case is almost solved by the access_control plugin, but instead of having a JWT created by an Application/Origin, I have a client JWT assertion that contains e.g. sub. The Client only sends the JWT during authn and receives an opaque Access Token.

The flow is as follows (see also RFC7521, RFC7523):

  1. client creates a JWT using a client secret (contains sub)
  2. POST /auth on the Application with the JWT
  3. Application returns opaque Access Token
  4. GET /some-resource with the token

When the client requests the URL another time, the Access Token may have expired and it creates a new one. But the cache may be still hot enough. I wouldn't want the new token to cause a cache miss. Instead, the proxy should know which sub that Access Token was created with and add it to the cache key for lookup.

mst avatar Nov 25 '22 07:11 mst

This issue has been automatically marked as stale because it has not had recent activity. Marking it stale to flag it for further consideration by the community.

github-actions[bot] avatar Nov 26 '23 01:11 github-actions[bot]