fulcio icon indicating copy to clipboard operation
fulcio copied to clipboard

TLS verification on OIDC Issuers

Open dandresm opened this issue 1 year ago • 2 comments

Right now a typical OIDC Issuer config would look like this:

"https://keycloak.local/sigstore-realm": { "IssuerURL": "https://key cloak.local/sigstore-realm", "ClientID": "sigstore", "Type": "email" }

In our use case, using an internal OIDC provider causes x509 certificate verification failure, because the TLS certificate is signed by an internal CA. My proposal is adding an optional parameter (TlsVerify=false) for disabling TLS verification when interacting with some OIDC providers. It would be even better to pass the certificate as parameter in PEM format, so fulcio can trust this certificate.

dandresm avatar May 19 '24 08:05 dandresm

Feel free to submit a PR for this! I would recommend adding it as a configuration for an OIDC issuer.

Hayden-IO avatar Jul 02 '24 23:07 Hayden-IO

@dandresm are you working on this :)

Sifungurux avatar Jul 09 '24 09:07 Sifungurux

/assign I’d like to take this on if no one else is working on it. Let me know if there’s anything else I should know!

Horiodino avatar Jan 27 '25 15:01 Horiodino

@Horiodino was there any alternative before this PR?

nasseredine avatar Mar 27 '25 17:03 nasseredine

i don't think so

Horiodino avatar Mar 28 '25 06:03 Horiodino

Thanks for your contribution @Horiodino. I am looking forward to trying this with the next release.

nasseredine avatar Mar 28 '25 08:03 nasseredine