-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Account Policy to Restrict Bearer Token Users #3084
Comments
matthiashanel
added a commit
to nats-io/jwt
that referenced
this issue
Apr 29, 2022
matthiashanel
added a commit
to nats-io/nsc
that referenced
this issue
Apr 29, 2022
change 2 out of 3 for nats-io/nats-server#3084 corresponds to nats-io/jwt#177 also fixed minor staticcheck issues Signed-off-by: Matthias Hanel <mh@synadia.com>
matthiashanel
added a commit
that referenced
this issue
Apr 29, 2022
change 3 out of 3 for #3084 corresponds to: nats-io/jwt#177 nats-io/nsc#495 Signed-off-by: Matthias Hanel <mh@synadia.com>
matthiashanel
added a commit
to nats-io/nsc
that referenced
this issue
Apr 29, 2022
change 2 out of 3 for nats-io/nats-server#3084 corresponds to nats-io/jwt#177 also fixed minor staticcheck issues Signed-off-by: Matthias Hanel <mh@synadia.com>
matthiashanel
added a commit
that referenced
this issue
Apr 29, 2022
I modified an existing data structure that held a similar attribute already. Instead this data structure references the claim. change 3 out of 3. Fixes #3084 corresponds to: nats-io/jwt#177 nats-io/nsc#495 Signed-off-by: Matthias Hanel <mh@synadia.com>
matthiashanel
added a commit
to nats-io/nsc
that referenced
this issue
May 9, 2022
* [added] support for account option DisallowBearerToken change 2 out of 3 for nats-io/nats-server#3084 corresponds to nats-io/jwt#177 also fixed minor staticcheck issues also removed unused ha_assets Signed-off-by: Matthias Hanel <mh@synadia.com>
matthiashanel
added a commit
that referenced
this issue
May 16, 2022
change 3 out of 3. Fixes #3084 corresponds to: nats-io/jwt#177 nats-io/nsc#495 Signed-off-by: Matthias Hanel <mh@synadia.com>
matthiashanel
added a commit
that referenced
this issue
Jun 13, 2022
change 3 out of 3. Fixes #3084 corresponds to: nats-io/jwt#177 nats-io/nsc#495 Signed-off-by: Matthias Hanel <mh@synadia.com>
matthiashanel
added a commit
that referenced
this issue
Jun 28, 2022
change 3 out of 3. Fixes #3084 corresponds to: nats-io/jwt#177 nats-io/nsc#495 Signed-off-by: Matthias Hanel <mh@synadia.com>
matthiashanel
added a commit
that referenced
this issue
Jun 29, 2022
* [added] support for jwt account option DisallowBearer change 3 out of 3. Fixes #3084 corresponds to: nats-io/jwt#177 nats-io/nsc#495 update jwt library to 2.3.0 Signed-off-by: Matthias Hanel <mh@synadia.com>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Feature Request
In operator-mode configurations (JWT-based), an account owner can create bearer token User JWTs using the
--bearer
option ofnsc
or the the JWT client libraries.Some operators may desire to create accounts that explicitly restrict the account owner from creating users with the bearer-token option.
Use Case:
Force client to present User JWT and perform a challenge-and-response authentication, i.e. sign nonce using possessed private NKEY.
Proposed Change:
Add an account-level claim that asserts that the account may not issue bearer User JWTs.
Who Benefits From The Change(s)?
Organizations/operators that have a policy against bearer token usage at runtime, but otherwise enable account owners to manage their own user lifecycle.
Alternative Approaches
The text was updated successfully, but these errors were encountered: