-
Notifications
You must be signed in to change notification settings - Fork 137
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow for multiple OIDC providers. #96
Conversation
I think we might want a way to "hint" at the proper issuer via a header or query parameter here. We could pull it out of the JWT itself, but that seems more error-prone. Going through them in a list is fine but we should probably add the hint if we want to support more than a few. |
What's the use case here, is it fail over type system if the first provider is unavailable (iterate over several providers?) |
This is useful for validating identity tokens granted by systems other than our dex endpoint. For GCP, a service account can manually generate an identity token for a specific audience (sigstore). By allowing other issues, we can validate these tokens in Fulcio. Signed-off-by: Dan Lorenc <dlorenc@google.com>
Left some more text in the description, but I think this would make eventual federation and headless modes easier. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
use case makes sense... would be nice to specify client ID separately for each issuer but for now this should be fine
Opened #100 to track that |
Triggering new Build
Signed-off-by: Dan Lorenc dlorenc@google.com