-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adding JWT secret with binary values #577
Comments
Only text JWT secrets are supported. I don't believe Cassandra could support a select statement on a blob column anyways. |
One solution would be to Base64 encode the secret. |
It is currently not possible because we would need to base64 all the secrets if we do so. |
That means that the JWT support won't work for any implementation where you do not have control over the secret. For example auth0 which is a fairly large third party tool. |
We could add a flag for a certain plugin enabled on an API and then Kong would systematically assume the secret is in base64 and decode it before validating the signature. Secrets would be added to consumers already base64 encoded, but there would be no way to enforce that, since credentials and plugins share no relation (that was why I was more in favour of "nothing or everything"). Btw, I wonder why auth0 is providing secrets with binary data? Why not stick to text? |
I solved this issue because I was able to set my own secret in Auth0. It wasn't particularly clear from their UI, but you can actually update the secret. So you can close this if you like, as that workaround is fine. |
@tecnobrat since I assume a lot of people will be finding this issue through Google, can you tell us a little bit more about the workaround and/or link to it? Thanks |
I simply use the ruby JWT library to
Its worth mentioning that
|
#838 adds support for base64 encoded secrets to |
Our JWT secret contains binary data. I've tried everything I can think of to send it to the Admin API as binary data.
I believe once I finally get it coming through properly, I'm getting this:
Our use-case is that we already have a JWT provider and would like to continue to use it.
The text was updated successfully, but these errors were encountered: