i am working on spring boot application with api gateway and JWT token authentication. after applying the spring security JWT authentication the gateway route functionality not working .i am getting 404 resource not found exception. Please some help me where i am doing wrong.
Related
In a project, I am using SAML authentication to connect AWS managed grafana to an Identity provider via keycloak as Identity broker.
While getting saml response back on https://<some-grafana-url>/saml/acs I am getting forbidden with error
{"message":"Failed to determine the state of the SSO redirect"}
I have checked NameIdPolicy Format in SAML Request is same as NameId Format under Subject in SAML response.
Certificate is also valid.
What else can lead to this error?
I Have a microservice with JWT plugin on Kong OSS. And i have this issue, when my bearer token JWT expires, how i can revew or create another token automatically?. Exists any JWT Signer plugin or JWT renewal for Kong OSS?
Greetings.Somebody have any ideas of solve this question?. Any experience of this issue?
I have a React App + Set of lambda's which are using JWT api gateway authorizer (using cognito user pool as IDP)
Additionally I have an Auth0 app + SAML IDP-initiated enterprise connection which direct the logged users in my React App along with SAML assertion.
What will be the best and simplest solution to enable users who are directed to the React app with the SAML to be authorized in the API gateway?
I have came up with this possible solution: create a custom API gateway authorizer which will accept the SAML assertion and will validate it using passport.
Is my solution applicable?
Is there an existing solution (code reference) for such authorizer? (could not find such...)
Are there simpler \ better solutions?
I have a kubernetes cluster and i have my application deployed in the pods. There is a endpoint URL of my application which i used to send POST requests from Postman. I need to provide some level of authentication to the my URL. I read the service account authentication using the JWT token.
How can i achieve the same feature in postman ??
I tried creating a new service account and took the secret and the associated JWT token as the Bearer token in postman. But it is not giving any kind of authentication.
https://medium.com/better-programming/k8s-tips-using-a-serviceaccount-801c433d0023
Cant directly answer your question, but from what comes to my mind is that: Istio supports Token-based end-user authentication with JSON Web Tokens.
You should understand I havent tried to do that, but this looks for me very promising: Istio End-User Authentication for Kubernetes using JSON Web Tokens (JWT) and Auth0
And to test JWT-based authentication and authorization workflow thay exactly use Postman, as you prefer.
I need to connect the zuul and keycloak. But my issue is that I am not gettting any idea or code. I need from api gateway to call keycloak and get the access token and from api gateway again to validate the access token and call the request api