[WIP] Removing .md files as a part of the Dex IdP Documentation migration. (#1810)
* Removing .md files as a part of the Dex IdP Documentation migration. https://github.com/dexidp/dex/issues/1761 https://github.com/dexidp/website/issues/2 Signed-off-by: Nate Waddington <nwaddington@cncf.io> * Updating README.md links after .md files removal. Signed-off-by: Nate Waddington <nwaddington@cncf.io> * Updating URL as per PR feedback. dexidp.org -> dexidp.io Signed-off-by: Nate Waddington <nwaddington@cncf.io> * removing errant ")" Signed-off-by: Nate Waddington <nwaddington@cncf.io>
This commit is contained in:
parent
d1f599dd32
commit
3f41b26fb9
42 changed files with 22 additions and 3424 deletions
1
Documentation/README.md
Normal file
1
Documentation/README.md
Normal file
|
@ -0,0 +1 @@
|
|||
These documents have moved to the [dexidp/website repo](https://github.com/dexidp/website).
|
|
@ -1,146 +0,0 @@
|
|||
# The Dex API
|
||||
|
||||
Dex provides a [gRPC](http://www.grpc.io/) service for programmatic modification of dex's state.
|
||||
The API is intended to expose hooks for management applications and is not expected to be used by most installations.
|
||||
|
||||
This document is an overview of how to interact with the API.
|
||||
|
||||
|
||||
## Configuration
|
||||
|
||||
Admins that wish to expose the gRPC service must add the following entry to the dex config file. This option is off by default.
|
||||
|
||||
```yaml
|
||||
grpc:
|
||||
# Cannot be the same address as an HTTP(S) service.
|
||||
addr: 127.0.0.1:5557
|
||||
|
||||
# Server certs. If TLS credentials aren't provided dex will run in plaintext (HTTP) mode.
|
||||
tlsCert: /etc/dex/grpc.crt
|
||||
tlsKey: /etc/dex/grpc.key
|
||||
|
||||
# Client auth CA.
|
||||
tlsClientCA: /etc/dex/client.crt
|
||||
|
||||
# enable reflection
|
||||
reflection: true
|
||||
```
|
||||
|
||||
|
||||
## Clients
|
||||
|
||||
gRPC is a suite of tools for generating client and server bindings from a common declarative language.
|
||||
The canonical schema for Dex's API can be found in the source tree at [`api/v2/api.proto`](../api/v2/api.proto).
|
||||
Go bindings are generated and maintained in the same directory for both public and internal use.
|
||||
|
||||
|
||||
### Go
|
||||
|
||||
A Go project can import the API module directly, without having to import the entire project:
|
||||
|
||||
```bash
|
||||
go get github.com/dexidp/dex/api/v2
|
||||
```
|
||||
|
||||
The client then can be used as follows:
|
||||
|
||||
```go
|
||||
package main
|
||||
|
||||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
"log"
|
||||
|
||||
"github.com/dexidp/dex/api/v2"
|
||||
"google.golang.org/grpc"
|
||||
"google.golang.org/grpc/credentials"
|
||||
)
|
||||
|
||||
func newDexClient(hostAndPort, caPath string) (api.DexClient, error) {
|
||||
creds, err := credentials.NewClientTLSFromFile(caPath, "")
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("load dex cert: %v", err)
|
||||
}
|
||||
|
||||
conn, err := grpc.Dial(hostAndPort, grpc.WithTransportCredentials(creds))
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("dial: %v", err)
|
||||
}
|
||||
return api.NewDexClient(conn), nil
|
||||
}
|
||||
|
||||
func main() {
|
||||
client, err := newDexClient("127.0.0.1:5557", "/etc/dex/grpc.crt")
|
||||
if err != nil {
|
||||
log.Fatalf("failed creating dex client: %v ", err)
|
||||
}
|
||||
|
||||
req := &api.CreateClientReq{
|
||||
Client: &api.Client{
|
||||
Id: "example-app",
|
||||
Name: "Example App",
|
||||
Secret: "ZXhhbXBsZS1hcHAtc2VjcmV0",
|
||||
RedirectUris: []string{"http://127.0.0.1:5555/callback"},
|
||||
},
|
||||
}
|
||||
|
||||
if _, err := client.CreateClient(context.TODO(), req); err != nil {
|
||||
log.Fatalf("failed creating oauth2 client: %v", err)
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
A clear working example of the Dex gRPC client for Go can be found [here](../examples/grpc-client/README.md).
|
||||
|
||||
|
||||
### Other languages
|
||||
|
||||
To generate a client for your own project install [`protoc`](https://github.com/google/protobuf/releases),
|
||||
install a protobuf generator for your project's language, and download the `api.proto` file.
|
||||
|
||||
Here is an example:
|
||||
|
||||
```bash
|
||||
# Download api.proto for a given version.
|
||||
$ DEX_VERSION=v2.24.0
|
||||
$ wget https://raw.githubusercontent.com/dexidp/dex/${DEX_VERSION}/api/v2/api.proto
|
||||
|
||||
# Generate the client bindings.
|
||||
$ protoc [YOUR LANG PARAMS] api.proto
|
||||
```
|
||||
|
||||
Client programs can then be written using the generated code.
|
||||
|
||||
|
||||
## Authentication and access control
|
||||
|
||||
The Dex API does not provide any authentication or authorization beyond TLS client auth.
|
||||
|
||||
Projects that wish to add access controls on top of the existing API should build apps which perform such checks.
|
||||
For example to provide a "Change password" screen, a client app could use Dex's OpenID Connect flow to authenticate an end user,
|
||||
then call Dex's API to update that user's password.
|
||||
|
||||
|
||||
## dexctl?
|
||||
|
||||
Dex does not ship with a command line tool for interacting with the API.
|
||||
Command line tools are useful but hard to version, easy to design poorly,
|
||||
and expose another interface which can never be changed in the name of compatibility.
|
||||
|
||||
While the Dex team would be open to re-implementing `dexctl` for v2 a majority of the work is writing a design document,
|
||||
not the actual programming effort.
|
||||
|
||||
|
||||
## Why not REST or gRPC Gateway?
|
||||
|
||||
Between v1 and v2, Dex switched from REST to gRPC. This largely stemmed from problems generating documentation,
|
||||
client bindings, and server frameworks that adequately expressed REST semantics.
|
||||
While [Google APIs](https://github.com/google/apis-client-generator), [Open API/Swagger](https://openapis.org/),
|
||||
and [gRPC Gateway](https://github.com/grpc-ecosystem/grpc-gateway) were evaluated,
|
||||
they often became clunky when trying to use specific HTTP error codes or complex request bodies.
|
||||
As a result, v2's API is entirely gRPC.
|
||||
|
||||
Many arguments _against_ gRPC cite short term convenience rather than production use cases.
|
||||
Though this is a recognized shortcoming, Dex already implements many features for developer convenience.
|
||||
For instance, users who wish to manually edit clients during testing can use the `staticClients` config field instead of the API.
|
|
@ -1 +0,0 @@
|
|||
This document has moved to [connectors/authproxy.md](connectors/authproxy.md).
|
|
@ -1,44 +0,0 @@
|
|||
Authentication through Atlassian Crowd
|
||||
|
||||
## Overview
|
||||
|
||||
Atlassian Crowd is a centralized identity management solution providing single sign-on and user identity.
|
||||
|
||||
Current connector uses request to [Crowd REST API](https://developer.atlassian.com/server/crowd/json-requests-and-responses/) endpoints:
|
||||
* `/user` - to get user-info
|
||||
* `/session` - to authenticate the user
|
||||
|
||||
Offline Access scope support provided with a new request to user authentication and user info endpoints.
|
||||
|
||||
## Configuration
|
||||
To start using the Atlassian Crowd connector, firstly you need to register an application in your Crowd like specified in the [docs](https://confluence.atlassian.com/crowd/adding-an-application-18579591.html).
|
||||
|
||||
The following is an example of a configuration for dex `examples/config-dev.yaml`:
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: atlassian-crowd
|
||||
# Required field for connector id.
|
||||
id: crowd
|
||||
# Required field for connector name.
|
||||
name: Crowd
|
||||
config:
|
||||
# Required field to connect to Crowd.
|
||||
baseURL: https://crowd.example.com/crowd
|
||||
# Credentials can be string literals or pulled from the environment.
|
||||
clientID: $ATLASSIAN_CROWD_APPLICATION_ID
|
||||
clientSecret: $ATLASSIAN_CROWD_CLIENT_SECRET
|
||||
# Optional groups whitelist, communicated through the "groups" scope.
|
||||
# If `groups` is omitted, all of the user's Crowd groups are returned when the groups scope is present.
|
||||
# If `groups` is provided, this acts as a whitelist - only the user's Crowd groups that are in the configured `groups` below will go into the groups claim.
|
||||
# Conversely, if the user is not in any of the configured `groups`, the user will not be authenticated.
|
||||
groups:
|
||||
- my-group
|
||||
# Prompt for username field.
|
||||
usernamePrompt: Login
|
||||
# Optionally set preferred_username claim.
|
||||
# If `preferredUsernameField` is omitted or contains an invalid option, the `preferred_username` claim will be empty.
|
||||
# If `preferredUsernameField` is set, the `preferred_username` claim will be set to the chosen Crowd user attribute value.
|
||||
# Possible choices are: "key", "name", "email"
|
||||
preferredUsernameField: name
|
||||
```
|
|
@ -1,138 +0,0 @@
|
|||
# Authenticating proxy
|
||||
|
||||
NOTE: This connector is experimental and may change in the future.
|
||||
|
||||
## Overview
|
||||
|
||||
The `authproxy` connector returns identities based on authentication which your
|
||||
front-end web server performs. Dex consumes the `X-Remote-User` header set by
|
||||
the proxy, which is then used as the user's email address.
|
||||
|
||||
__The proxy MUST remove any `X-Remote-*` headers set by the client, for any URL
|
||||
path, before the request is forwarded to dex.__
|
||||
|
||||
The connector does not support refresh tokens or groups.
|
||||
|
||||
## Configuration
|
||||
|
||||
The `authproxy` connector is used by proxies to implement login strategies not
|
||||
supported by dex. For example, a proxy could handle a different OAuth2 strategy
|
||||
such as Slack. The connector takes no configuration other than a `name` and `id`:
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
# Slack login implemented by an authenticating proxy, not by dex.
|
||||
- type: authproxy
|
||||
id: slack
|
||||
name: Slack
|
||||
```
|
||||
|
||||
The proxy only needs to authenticate the user when they attempt to visit the
|
||||
callback URL path:
|
||||
|
||||
```
|
||||
( dex issuer URL )/callback/( connector id )?( url query )
|
||||
```
|
||||
|
||||
For example, if dex is running at `https://auth.example.com/dex` and the connector
|
||||
ID is `slack`, the callback URL would look like:
|
||||
|
||||
```
|
||||
https://auth.example.com/dex/callback/slack?state=xdg3z6quhrhwaueo5iysvliqf
|
||||
```
|
||||
|
||||
The proxy should login the user then return them to the exact URL (inlucing the
|
||||
query), setting `X-Remote-User` to the user's email before proxying the request
|
||||
to dex.
|
||||
|
||||
## Configuration example - Apache 2
|
||||
|
||||
The following is an example config file that can be used by the external
|
||||
connector to authenticate a user.
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: authproxy
|
||||
id: myBasicAuth
|
||||
name: HTTP Basic Auth
|
||||
```
|
||||
|
||||
The authproxy connector assumes that you configured your front-end web server
|
||||
such that it performs authentication for the `/dex/callback/myBasicAuth`
|
||||
location and provides the result in the X-Remote-User HTTP header. The following
|
||||
configuration will work for Apache 2.4.10+:
|
||||
|
||||
```
|
||||
<Location /dex/>
|
||||
ProxyPass "http://localhost:5556/dex/"
|
||||
ProxyPassReverse "http://localhost:5556/dex/"
|
||||
|
||||
# Strip the X-Remote-User header from all requests except for the ones
|
||||
# where we override it.
|
||||
RequestHeader unset X-Remote-User
|
||||
</Location>
|
||||
|
||||
<Location /dex/callback/myBasicAuth>
|
||||
AuthType Basic
|
||||
AuthName "db.debian.org webPassword"
|
||||
AuthBasicProvider file
|
||||
AuthUserFile "/etc/apache2/debian-web-pw.htpasswd"
|
||||
Require valid-user
|
||||
|
||||
# Defense in depth: clear the Authorization header so that
|
||||
# Debian Web Passwords never even reach dex.
|
||||
RequestHeader unset Authorization
|
||||
|
||||
# Requires Apache 2.4.10+
|
||||
RequestHeader set X-Remote-User expr=%{REMOTE_USER}@debian.org
|
||||
|
||||
ProxyPass "http://localhost:5556/dex/callback/myBasicAuth"
|
||||
ProxyPassReverse "http://localhost:5556/dex/callback/myBasicAuth"
|
||||
</Location>
|
||||
```
|
||||
|
||||
## Full Apache2 setup
|
||||
|
||||
After installing your Linux distribution’s Apache2 package, place the following
|
||||
virtual host configuration in e.g. `/etc/apache2/sites-available/sso.conf`:
|
||||
|
||||
```
|
||||
<VirtualHost sso.example.net>
|
||||
ServerName sso.example.net
|
||||
|
||||
ServerAdmin webmaster@localhost
|
||||
DocumentRoot /var/www/html
|
||||
|
||||
ErrorLog ${APACHE_LOG_DIR}/error.log
|
||||
CustomLog ${APACHE_LOG_DIR}/access.log combined
|
||||
|
||||
<Location /dex/>
|
||||
ProxyPass "http://localhost:5556/dex/"
|
||||
ProxyPassReverse "http://localhost:5556/dex/"
|
||||
|
||||
# Strip the X-Remote-User header from all requests except for the ones
|
||||
# where we override it.
|
||||
RequestHeader unset X-Remote-User
|
||||
</Location>
|
||||
|
||||
<Location /dex/callback/myBasicAuth>
|
||||
AuthType Basic
|
||||
AuthName "db.debian.org webPassword"
|
||||
AuthBasicProvider file
|
||||
AuthUserFile "/etc/apache2/debian-web-pw.htpasswd"
|
||||
Require valid-user
|
||||
|
||||
# Defense in depth: clear the Authorization header so that
|
||||
# Debian Web Passwords never even reach dex.
|
||||
RequestHeader unset Authorization
|
||||
|
||||
# Requires Apache 2.4.10+
|
||||
RequestHeader set X-Remote-User expr=%{REMOTE_USER}@debian.org
|
||||
|
||||
ProxyPass "http://localhost:5556/dex/callback/myBasicAuth"
|
||||
ProxyPassReverse "http://localhost:5556/dex/callback/myBasicAuth"
|
||||
</Location>
|
||||
</VirtualHost>
|
||||
```
|
||||
|
||||
Then, enable it using `a2ensite sso.conf`, followed by a restart of Apache2.
|
|
@ -1,38 +0,0 @@
|
|||
# Authentication through Bitbucket Cloud
|
||||
|
||||
## Overview
|
||||
|
||||
One of the login options for dex uses the Bitbucket OAuth2 flow to identify the end user through their Bitbucket account.
|
||||
|
||||
When a client redeems a refresh token through dex, dex will re-query Bitbucket to update user information in the ID Token. To do this, __dex stores a readonly Bitbucket access token in its backing datastore.__ Users that reject dex's access through Bitbucket will also revoke all dex clients which authenticated them through Bitbucket.
|
||||
|
||||
## Configuration
|
||||
|
||||
Register a new OAuth consumer with [Bitbucket](https://confluence.atlassian.com/bitbucket/oauth-on-bitbucket-cloud-238027431.html) ensuring the callback URL is `(dex issuer)/callback`. For example if dex is listening at the non-root path `https://auth.example.com/dex` the callback would be `https://auth.example.com/dex/callback`.
|
||||
|
||||
The application requires the user to grant only the `Read Account` permission.
|
||||
|
||||
The following is an example of a configuration for `examples/config-dev.yaml`:
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: bitbucket-cloud
|
||||
# Required field for connector id.
|
||||
id: bitbucket-cloud
|
||||
# Required field for connector name.
|
||||
name: Bitbucket Cloud
|
||||
config:
|
||||
# Credentials can be string literals or pulled from the environment.
|
||||
clientID: $BITBUCKET_CLIENT_ID
|
||||
clientSecret: $BITBUCKET_CLIENT_SECRET
|
||||
redirectURI: http://127.0.0.1:5556/dex/callback
|
||||
# Optional teams whitelist, communicated through the "groups" scope.
|
||||
# If `teams` is omitted, all of the user's Bitbucket teams are returned when the groups scope is present.
|
||||
# If `teams` is provided, this acts as a whitelist - only the user's Bitbucket teams that are in the configured `teams` below will go into the groups claim. Conversely, if the user is not in any of the configured `teams`, the user will not be authenticated.
|
||||
teams:
|
||||
- my-team
|
||||
# Optional parameter to include team groups.
|
||||
# If enabled, the groups claim of dex id_token will looks like this:
|
||||
# ["my_team", "my_team/administrators", "my_team/members"]
|
||||
includeTeamGroups: true
|
||||
```
|
|
@ -1,29 +0,0 @@
|
|||
# Authentication through Gitea
|
||||
|
||||
## Overview
|
||||
|
||||
One of the login options for dex uses the Gitea OAuth2 flow to identify the end user through their Gitea account.
|
||||
|
||||
When a client redeems a refresh token through dex, dex will re-query Gitea to update user information in the ID Token. To do this, __dex stores a readonly Gitea access token in its backing datastore.__ Users that reject dex's access through Gitea will also revoke all dex clients which authenticated them through Gitea.
|
||||
|
||||
## Configuration
|
||||
|
||||
Register a new OAuth consumer with [Gitea](https://docs.gitea.io/en-us/oauth2-provider/) ensuring the callback URL is `(dex issuer)/callback`. For example if dex is listening at the non-root path `https://auth.example.com/dex` the callback would be `https://auth.example.com/dex/callback`.
|
||||
|
||||
The following is an example of a configuration for `examples/config-dev.yaml`:
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: gitea
|
||||
# Required field for connector id.
|
||||
id: gitea
|
||||
# Required field for connector name.
|
||||
name: Gitea
|
||||
config:
|
||||
# Credentials can be string literals or pulled from the environment.
|
||||
clientID: $GITEA_CLIENT_ID
|
||||
clientSecret: $GITEA_CLIENT_SECRET
|
||||
redirectURI: http://127.0.0.1:5556/dex/callback
|
||||
# optional, default = https://gitea.com
|
||||
baseURL: https://gitea.com
|
||||
```
|
|
@ -1,150 +0,0 @@
|
|||
# Authentication through GitHub
|
||||
|
||||
## Overview
|
||||
|
||||
One of the login options for dex uses the GitHub OAuth2 flow to identify the end user through their GitHub account.
|
||||
|
||||
When a client redeems a refresh token through dex, dex will re-query GitHub to update user information in the ID Token. To do this, __dex stores a readonly GitHub access token in its backing datastore.__ Users that reject dex's access through GitHub will also revoke all dex clients which authenticated them through GitHub.
|
||||
|
||||
## Caveats
|
||||
|
||||
* A user must explicitly [request][github-request-org-access] an [organization][github-orgs] give dex [resource access][github-approve-org-access]. Dex will not have the correct permissions to determine if the user is in that organization otherwise, and the user will not be able to log in. This request mechanism is a feature of the GitHub API.
|
||||
|
||||
## Configuration
|
||||
|
||||
Register a new application with [GitHub][github-oauth2] ensuring the callback URL is `(dex issuer)/callback`. For example if dex is listening at the non-root path `https://auth.example.com/dex` the callback would be `https://auth.example.com/dex/callback`.
|
||||
|
||||
The following is an example of a configuration for `examples/config-dev.yaml`:
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: github
|
||||
# Required field for connector id.
|
||||
id: github
|
||||
# Required field for connector name.
|
||||
name: GitHub
|
||||
config:
|
||||
# Credentials can be string literals or pulled from the environment.
|
||||
clientID: $GITHUB_CLIENT_ID
|
||||
clientSecret: $GITHUB_CLIENT_SECRET
|
||||
redirectURI: http://127.0.0.1:5556/dex/callback
|
||||
|
||||
# Optional organizations and teams, communicated through the "groups" scope.
|
||||
#
|
||||
# NOTE: This is an EXPERIMENTAL config option and will likely change.
|
||||
#
|
||||
# Legacy 'org' field. 'org' and 'orgs' cannot be used simultaneously. A user
|
||||
# MUST be a member of the following org to authenticate with dex.
|
||||
# org: my-organization
|
||||
#
|
||||
# Dex queries the following organizations for group information if the
|
||||
# "groups" scope is provided. Group claims are formatted as "(org):(team)".
|
||||
# For example if a user is part of the "engineering" team of the "coreos"
|
||||
# org, the group claim would include "coreos:engineering".
|
||||
#
|
||||
# If orgs are specified in the config then user MUST be a member of at least one of the specified orgs to
|
||||
# authenticate with dex.
|
||||
#
|
||||
# If neither 'org' nor 'orgs' are specified in the config and 'loadAllGroups' setting set to true then user
|
||||
# authenticate with ALL user's Github groups. Typical use case for this setup:
|
||||
# provide read-only access to everyone and give full permissions if user has 'my-organization:admins-team' group claim.
|
||||
orgs:
|
||||
- name: my-organization
|
||||
# Include all teams as claims.
|
||||
- name: my-organization-with-teams
|
||||
# A white list of teams. Only include group claims for these teams.
|
||||
teams:
|
||||
- red-team
|
||||
- blue-team
|
||||
# Flag which indicates that all user groups and teams should be loaded.
|
||||
loadAllGroups: false
|
||||
|
||||
# Optional choice between 'name' (default), 'slug', or 'both'.
|
||||
#
|
||||
# As an example, group claims for member of 'Site Reliability Engineers' in
|
||||
# Acme organization would yield:
|
||||
# - ['acme:Site Reliability Engineers'] for 'name'
|
||||
# - ['acme:site-reliability-engineers'] for 'slug'
|
||||
# - ['acme:Site Reliability Engineers', 'acme:site-reliability-engineers'] for 'both'
|
||||
teamNameField: slug
|
||||
# flag which will switch from using the internal GitHub id to the users handle (@mention) as the user id.
|
||||
# It is possible for a user to change their own user name but it is very rare for them to do so
|
||||
useLoginAsID: false
|
||||
```
|
||||
|
||||
## GitHub Enterprise
|
||||
|
||||
Users can use their GitHub Enterprise account to login to dex. The following configuration can be used to enable a GitHub Enterprise connector on dex:
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: github
|
||||
# Required field for connector id.
|
||||
id: github
|
||||
# Required field for connector name.
|
||||
name: GitHub
|
||||
config:
|
||||
# Required fields. Dex must be pre-registered with GitHub Enterprise
|
||||
# to get the following values.
|
||||
# Credentials can be string literals or pulled from the environment.
|
||||
clientID: $GITHUB_CLIENT_ID
|
||||
clientSecret: $GITHUB_CLIENT_SECRET
|
||||
redirectURI: http://127.0.0.1:5556/dex/callback
|
||||
# Optional organizations and teams, communicated through the "groups" scope.
|
||||
#
|
||||
# NOTE: This is an EXPERIMENTAL config option and will likely change.
|
||||
#
|
||||
# Legacy 'org' field. 'org' and 'orgs' cannot be used simultaneously. A user
|
||||
# MUST be a member of the following org to authenticate with dex.
|
||||
# org: my-organization
|
||||
#
|
||||
# Dex queries the following organizations for group information if the
|
||||
# "groups" scope is provided. Group claims are formatted as "(org):(team)".
|
||||
# For example if a user is part of the "engineering" team of the "coreos"
|
||||
# org, the group claim would include "coreos:engineering".
|
||||
#
|
||||
# A user MUST be a member of at least one of the following orgs to
|
||||
# authenticate with dex.
|
||||
orgs:
|
||||
- name: my-organization
|
||||
# Include all teams as claims.
|
||||
- name: my-organization-with-teams
|
||||
# A white list of teams. Only include group claims for these teams.
|
||||
teams:
|
||||
- red-team
|
||||
- blue-team
|
||||
# Required ONLY for GitHub Enterprise.
|
||||
# This is the Hostname of the GitHub Enterprise account listed on the
|
||||
# management console. Ensure this domain is routable on your network.
|
||||
hostName: git.example.com
|
||||
# ONLY for GitHub Enterprise. Optional field.
|
||||
# Used to support self-signed or untrusted CA root certificates.
|
||||
rootCA: /etc/dex/ca.crt
|
||||
```
|
||||
|
||||
### Generate TLS assets
|
||||
|
||||
Running Dex with HTTPS enabled requires a valid SSL certificate, and the API server needs to trust the certificate of the signing CA using the `--oidc-ca-file` flag.
|
||||
|
||||
For our example use case, the TLS assets can be created using the following command:
|
||||
|
||||
```
|
||||
$ ./examples/k8s/gencert.sh
|
||||
```
|
||||
|
||||
This will generate several files under the `ssl` directory, the important ones being `cert.pem` ,`key.pem` and `ca.pem`. The generated SSL certificate is for 'dex.example.com', although you could change this by editing `gencert.sh` if required.
|
||||
|
||||
### Run example client app with Github config
|
||||
|
||||
```
|
||||
./bin/example-app --issuer-root-ca examples/k8s/ssl/ca.pem
|
||||
```
|
||||
|
||||
1. Open browser to http://127.0.0.1:5555
|
||||
2. Click Login
|
||||
3. Select Log in with GitHub and grant access to dex to view your profile
|
||||
|
||||
[github-oauth2]: https://github.com/settings/applications/new
|
||||
[github-orgs]: https://developer.github.com/v3/orgs/
|
||||
[github-request-org-access]: https://help.github.com/articles/requesting-organization-approval-for-oauth-apps/
|
||||
[github-approve-org-access]: https://help.github.com/articles/approving-oauth-apps-for-your-organization/
|
|
@ -1,39 +0,0 @@
|
|||
# Authentication through Gitlab
|
||||
|
||||
## Overview
|
||||
|
||||
GitLab is a web-based Git repository manager with wiki and issue tracking features, using an open source license, developed by GitLab Inc. One of the login options for dex uses the GitLab OAuth2 flow to identify the end user through their GitLab account. You can use this option with [gitlab.com](gitlab.com), GitLab community or enterprise edition.
|
||||
|
||||
When a client redeems a refresh token through dex, dex will re-query GitLab to update user information in the ID Token. To do this, __dex stores a readonly GitLab access token in its backing datastore.__ Users that reject dex's access through GitLab will also revoke all dex clients which authenticated them through GitLab.
|
||||
|
||||
## Configuration
|
||||
|
||||
Register a new application via `User Settings -> Applications` ensuring the callback URL is `(dex issuer)/callback`. For example if dex is listening at the non-root path `https://auth.example.com/dex` the callback would be `https://auth.example.com/dex/callback`.
|
||||
|
||||
The application requires the user to grant the `read_user` and `openid` scopes. The latter is required only if group membership is a desired claim.
|
||||
|
||||
The following is an example of a configuration for `examples/config-dev.yaml`:
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: gitlab
|
||||
# Required field for connector id.
|
||||
id: gitlab
|
||||
# Required field for connector name.
|
||||
name: GitLab
|
||||
config:
|
||||
# optional, default = https://gitlab.com
|
||||
baseURL: https://gitlab.com
|
||||
# Credentials can be string literals or pulled from the environment.
|
||||
clientID: $GITLAB_APPLICATION_ID
|
||||
clientSecret: $GITLAB_CLIENT_SECRET
|
||||
redirectURI: http://127.0.0.1:5556/dex/callback
|
||||
# Optional groups whitelist, communicated through the "groups" scope.
|
||||
# If `groups` is omitted, all of the user's GitLab groups are returned when the groups scope is present.
|
||||
# If `groups` is provided, this acts as a whitelist - only the user's GitLab groups that are in the configured `groups` below will go into the groups claim. Conversely, if the user is not in any of the configured `groups`, the user will not be authenticated.
|
||||
groups:
|
||||
- my-group
|
||||
# flag which will switch from using the internal GitLab id to the users handle (@mention) as the user id.
|
||||
# It is possible for a user to change their own user name but it is very rare for them to do so
|
||||
useLoginAsID: false
|
||||
```
|
|
@ -1,60 +0,0 @@
|
|||
# Authentication through Google
|
||||
|
||||
## Overview
|
||||
|
||||
Dex is able to use Google's OpenID Connect provider as an authentication source.
|
||||
|
||||
The connector uses the same authentication flow as the OpenID Connect provider but adds Google specific features such as Hosted domain support and reading groups using a service account.
|
||||
|
||||
## Configuration
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: google
|
||||
id: google
|
||||
name: Google
|
||||
config:
|
||||
|
||||
# Connector config values starting with a "$" will read from the environment.
|
||||
clientID: $GOOGLE_CLIENT_ID
|
||||
clientSecret: $GOOGLE_CLIENT_SECRET
|
||||
|
||||
# Dex's issuer URL + "/callback"
|
||||
redirectURI: http://127.0.0.1:5556/callback
|
||||
|
||||
# Google supports whitelisting allowed domains when using G Suite
|
||||
# (Google Apps). The following field can be set to a list of domains
|
||||
# that can log in:
|
||||
#
|
||||
# hostedDomains:
|
||||
# - example.com
|
||||
|
||||
# The Google connector supports whitelisting allowed groups when using G Suite
|
||||
# (Google Apps). The following field can be set to a list of groups
|
||||
# that can log in:
|
||||
#
|
||||
# groups:
|
||||
# - admins@example.com
|
||||
|
||||
# Google does not support the OpenID Connect groups claim and only supports
|
||||
# fetching a user's group membership with a service account.
|
||||
# This service account requires an authentication JSON file and the email
|
||||
# of a G Suite admin to impersonate:
|
||||
#
|
||||
#serviceAccountFilePath: googleAuth.json
|
||||
#adminEmail: super-user@example.com
|
||||
```
|
||||
|
||||
## Fetching groups from Google
|
||||
To allow Dex to fetch group information from Google, you will need to configure a service account for Dex to use.
|
||||
This account needs Domain-Wide Delegation and permission to access the `https://www.googleapis.com/auth/admin.directory.group.readonly` API scope.
|
||||
|
||||
To get group fetching set up:
|
||||
|
||||
1. Follow the [instructions](https://developers.google.com/admin-sdk/directory/v1/guides/delegation) to set up a service account with Domain-Wide Delegation
|
||||
- During service account creation, a JSON key file will be created that contains authentication information for the service account. This needs storing in a location accessible by Dex and you will set the `serviceAccountFilePath` to point at it.
|
||||
- When delegating the API scopes to the service account, delegate the `https://www.googleapis.com/auth/admin.directory.group.readonly` scope and only this scope. If you delegate more scopes to the service account, it will not be able to access the API.
|
||||
2. Enable the [Admin SDK](https://console.developers.google.com/apis/library/admin.googleapis.com/)
|
||||
3. Add the `serviceAccountFilePath` and `adminEmail` configuration options to your Dex config.
|
||||
- `serviceAccountFilePath` should point to the location of the service account JSON key file
|
||||
- `adminEmail` should be the email of a G Suite super user. The service account you created earlier will impersonate this user when making calls to the admin API. A valid user should be able to retrieve a list of groups when [testing the API](https://developers.google.com/admin-sdk/directory/v1/reference/groups/list#try-it).
|
|
@ -1,133 +0,0 @@
|
|||
# Integration kubelogin and Active Directory
|
||||
|
||||
## Overview
|
||||
|
||||
kubelogin is helper tool for kubernetes and oidc integration.
|
||||
It makes easy to login Open ID Provider.
|
||||
This document describes how dex work with kubelogin and Active Directory.
|
||||
|
||||
examples/config-ad-kubelogin.yaml is sample configuration to integrate Active Directory and kubelogin.
|
||||
|
||||
## Precondition
|
||||
|
||||
1. Active Directory
|
||||
You should have Active Directory or LDAP has Active Directory compatible schema such as samba ad.
|
||||
You may have user objects and group objects in AD. Please ensure TLS is enabled.
|
||||
|
||||
2. Install kubelogin
|
||||
Download kubelogin from https://github.com/int128/kubelogin/releases.
|
||||
Install it to your terminal.
|
||||
|
||||
## Getting started
|
||||
|
||||
### Generate certificate and private key
|
||||
|
||||
Create OpenSSL conf req.conf as follow:
|
||||
|
||||
```
|
||||
[req]
|
||||
req_extensions = v3_req
|
||||
distinguished_name = req_distinguished_name
|
||||
|
||||
[req_distinguished_name]
|
||||
|
||||
[ v3_req ]
|
||||
basicConstraints = CA:FALSE
|
||||
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||
subjectAltName = @alt_names
|
||||
|
||||
[alt_names]
|
||||
DNS.1 = dex.example.com
|
||||
```
|
||||
|
||||
Please replace dex.example.com to your favorite hostname.
|
||||
Generate certificate and private key by following command.
|
||||
|
||||
```console
|
||||
$ openssl req -new -x509 -sha256 -days 3650 -newkey rsa:4096 -extensions v3_req -out openid-ca.pem -keyout openid-key.pem -config req.cnf -subj "/CN=kube-ca" -nodes
|
||||
$ ls openid*
|
||||
openid-ca.pem openid-key.pem
|
||||
```
|
||||
|
||||
### Modify dex config
|
||||
|
||||
Modify following host, bindDN and bindPW in examples/config-ad-kubelogin.yaml.
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: ldap
|
||||
name: OpenLDAP
|
||||
id: ldap
|
||||
config:
|
||||
host: ldap.example.com:636
|
||||
|
||||
# No TLS for this setup.
|
||||
insecureNoSSL: false
|
||||
insecureSkipVerify: true
|
||||
|
||||
# This would normally be a read-only user.
|
||||
bindDN: cn=Administrator,cn=users,dc=example,dc=com
|
||||
bindPW: admin0!
|
||||
```
|
||||
|
||||
### Run dex
|
||||
|
||||
```
|
||||
$ bin/dex serve examples/config-ad-kubelogin.yaml
|
||||
```
|
||||
|
||||
### Configure kubernetes with oidc
|
||||
|
||||
Copy openid-ca.pem to /etc/ssl/certs/openid-ca.pem on master node.
|
||||
|
||||
Use the following flags to point your API server(s) at dex. `dex.example.com` should be replaced by whatever DNS name or IP address dex is running under.
|
||||
|
||||
```
|
||||
--oidc-issuer-url=https://dex.example.com:32000/dex
|
||||
--oidc-client-id=kubernetes
|
||||
--oidc-ca-file=/etc/ssl/certs/openid-ca.pem
|
||||
--oidc-username-claim=email
|
||||
--oidc-groups-claim=groups
|
||||
```
|
||||
|
||||
Then restart API server(s).
|
||||
|
||||
|
||||
See https://kubernetes.io/docs/reference/access-authn-authz/authentication/ for more detail.
|
||||
|
||||
### Set up kubeconfig
|
||||
|
||||
Add a new user to the kubeconfig for dex authentication:
|
||||
|
||||
```console
|
||||
$ kubectl config set-credentials oidc \
|
||||
--exec-api-version=client.authentication.k8s.io/v1beta1 \
|
||||
--exec-command=kubectl \
|
||||
--exec-arg=oidc-login \
|
||||
--exec-arg=get-token \
|
||||
--exec-arg=--oidc-issuer-url=https://dex.example.com:32000/dex \
|
||||
--exec-arg=--oidc-client-id=kubernetes \
|
||||
--exec-arg=--oidc-client-secret=ZXhhbXBsZS1hcHAtc2VjcmV0 \
|
||||
--exec-arg=--extra-scope=profile \
|
||||
--exec-arg=--extra-scope=email \
|
||||
--exec-arg=--extra-scope=groups \
|
||||
--exec-arg=--certificate-authority-data=$(base64 -w 0 openid-ca.pem)
|
||||
```
|
||||
|
||||
Please confirm `--oidc-issuer-url`, `--oidc-client-id`, `--oidc-client-secret` and `--certificate-authority-data` are same as values in config-ad-kubelogin.yaml.
|
||||
|
||||
Run the following command:
|
||||
|
||||
```console
|
||||
$ kubectl --user=oidc cluster-info
|
||||
```
|
||||
|
||||
It launches the browser and navigates it to http://localhost:8000.
|
||||
Please log in with your AD account (eg. test@example.com) and password.
|
||||
After login and grant, you can access the cluster.
|
||||
|
||||
You can switch the current context to dex authentication.
|
||||
|
||||
```console
|
||||
$ kubectl config set-context --current --user=oidc
|
||||
```
|
|
@ -1,346 +0,0 @@
|
|||
# Authentication through LDAP
|
||||
|
||||
## Overview
|
||||
|
||||
The LDAP connector allows email/password based authentication, backed by a LDAP directory.
|
||||
|
||||
The connector executes two primary queries:
|
||||
|
||||
1. Finding the user based on the end user's credentials.
|
||||
2. Searching for groups using the user entry.
|
||||
|
||||
## Getting started
|
||||
|
||||
The dex repo contains a basic LDAP setup using [OpenLDAP][openldap].
|
||||
|
||||
First start the LDAP server using docker-compose. This will run the OpenLDAP daemon in a Docker container, and seed it with an initial set of users.
|
||||
|
||||
```
|
||||
cd examples/ldap
|
||||
docker-compose up
|
||||
```
|
||||
|
||||
This container is expected to print several warning messages which are normal. Once the server is up, run dex in another terminal.
|
||||
|
||||
```
|
||||
./bin/dex serve examples/ldap/config-ldap.yaml
|
||||
```
|
||||
|
||||
Then run the OAuth client in another terminal.
|
||||
|
||||
```
|
||||
./bin/example-app
|
||||
```
|
||||
|
||||
Go to [http://localhost:5555](http://localhost:5555), login and enter the username and password of the LDAP user: `janedoe@example.com`/`foo`. Add the "groups" scope as part of the initial redirect to add group information from the LDAP server.
|
||||
|
||||
## Security considerations
|
||||
|
||||
Dex attempts to bind with the backing LDAP server using the end user's _plain text password_. Though some LDAP implementations allow passing hashed passwords, dex doesn't support hashing and instead _strongly recommends that all administrators just use TLS_. This can often be achieved by using port 636 instead of 389, and administrators that choose 389 are actively leaking passwords.
|
||||
|
||||
Dex currently allows insecure connections because the project is still verifying that dex works with the wide variety of LDAP implementations. However, dex may remove this transport option, and _users who configure LDAP login using 389 are not covered by any compatibility guarantees with future releases._
|
||||
|
||||
## Configuration
|
||||
|
||||
User entries are expected to have an email attribute (configurable through `emailAttr`), and a display name attribute (configurable through `nameAttr`). `*Attr` attributes could be set to "DN" in situations where it is needed but not available elsewhere, and if "DN" attribute does not exist in the record.
|
||||
|
||||
For the purposes of configuring this connector, "DN" is case-sensitive and should always be capitalised.
|
||||
|
||||
The following is an example config file that can be used by the LDAP connector to authenticate a user.
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: ldap
|
||||
# Required field for connector id.
|
||||
id: ldap
|
||||
# Required field for connector name.
|
||||
name: LDAP
|
||||
config:
|
||||
# Host and optional port of the LDAP server in the form "host:port".
|
||||
# If the port is not supplied, it will be guessed based on "insecureNoSSL",
|
||||
# and "startTLS" flags. 389 for insecure or StartTLS connections, 636
|
||||
# otherwise.
|
||||
host: ldap.example.com:636
|
||||
|
||||
# Following field is required if the LDAP host is not using TLS (port 389).
|
||||
# Because this option inherently leaks passwords to anyone on the same network
|
||||
# as dex, THIS OPTION MAY BE REMOVED WITHOUT WARNING IN A FUTURE RELEASE.
|
||||
#
|
||||
# insecureNoSSL: true
|
||||
|
||||
# If a custom certificate isn't provide, this option can be used to turn on
|
||||
# TLS certificate checks. As noted, it is insecure and shouldn't be used outside
|
||||
# of explorative phases.
|
||||
#
|
||||
# insecureSkipVerify: true
|
||||
|
||||
# When connecting to the server, connect using the ldap:// protocol then issue
|
||||
# a StartTLS command. If unspecified, connections will use the ldaps:// protocol
|
||||
#
|
||||
# startTLS: true
|
||||
|
||||
# Path to a trusted root certificate file. Default: use the host's root CA.
|
||||
rootCA: /etc/dex/ldap.ca
|
||||
|
||||
# A raw certificate file can also be provided inline.
|
||||
# rootCAData: ( base64 encoded PEM file )
|
||||
|
||||
# The DN and password for an application service account. The connector uses
|
||||
# these credentials to search for users and groups. Not required if the LDAP
|
||||
# server provides access for anonymous auth.
|
||||
# Please note that if the bind password contains a `$`, it has to be saved in an
|
||||
# environment variable which should be given as the value to `bindPW`.
|
||||
bindDN: uid=serviceaccount,cn=users,dc=example,dc=com
|
||||
bindPW: password
|
||||
|
||||
# The attribute to display in the provided password prompt. If unset, will
|
||||
# display "Username"
|
||||
usernamePrompt: SSO Username
|
||||
|
||||
# User search maps a username and password entered by a user to a LDAP entry.
|
||||
userSearch:
|
||||
# BaseDN to start the search from. It will translate to the query
|
||||
# "(&(objectClass=person)(uid=<username>))".
|
||||
baseDN: cn=users,dc=example,dc=com
|
||||
# Optional filter to apply when searching the directory.
|
||||
filter: "(objectClass=person)"
|
||||
|
||||
# username attribute used for comparing user entries. This will be translated
|
||||
# and combined with the other filter as "(<attr>=<username>)".
|
||||
username: uid
|
||||
# The following three fields are direct mappings of attributes on the user entry.
|
||||
# String representation of the user.
|
||||
idAttr: uid
|
||||
# Required. Attribute to map to Email.
|
||||
emailAttr: mail
|
||||
# Maps to display name of users. No default value.
|
||||
nameAttr: name
|
||||
|
||||
# Group search queries for groups given a user entry.
|
||||
groupSearch:
|
||||
# BaseDN to start the search from. It will translate to the query
|
||||
# "(&(objectClass=group)(member=<user uid>))".
|
||||
baseDN: cn=groups,dc=freeipa,dc=example,dc=com
|
||||
# Optional filter to apply when searching the directory.
|
||||
filter: "(objectClass=group)"
|
||||
|
||||
# Following list contains field pairs that are used to match a user to a group. It adds an additional
|
||||
# requirement to the filter that an attribute in the group must match the user's
|
||||
# attribute value.
|
||||
userMatchers:
|
||||
- userAttr: uid
|
||||
groupAttr: member
|
||||
|
||||
# Represents group name.
|
||||
nameAttr: name
|
||||
```
|
||||
|
||||
The LDAP connector first initializes a connection to the LDAP directory using the `bindDN` and `bindPW`. It then tries to search for the given `username` and bind as that user to verify their password.
|
||||
Searches that return multiple entries are considered ambiguous and will return an error.
|
||||
|
||||
## Example: Mapping a schema to a search config
|
||||
|
||||
Writing a search configuration often involves mapping an existing LDAP schema to the various options dex provides. To query an existing LDAP schema install the OpenLDAP tool `ldapsearch`. For `rpm` based distros run:
|
||||
|
||||
```
|
||||
sudo dnf install openldap-clients
|
||||
```
|
||||
|
||||
For `apt-get`:
|
||||
|
||||
```
|
||||
sudo apt-get install ldap-utils
|
||||
```
|
||||
|
||||
For smaller user directories it may be practical to dump the entire contents and search by hand.
|
||||
|
||||
```
|
||||
ldapsearch -x -h ldap.example.org -b 'dc=example,dc=org' | less
|
||||
```
|
||||
|
||||
First, find a user entry. User entries declare users who can login to LDAP connector using username and password.
|
||||
|
||||
```
|
||||
dn: uid=jdoe,cn=users,cn=compat,dc=example,dc=org
|
||||
cn: Jane Doe
|
||||
objectClass: posixAccount
|
||||
objectClass: ipaOverrideTarget
|
||||
objectClass: top
|
||||
gidNumber: 200015
|
||||
gecos: Jane Doe
|
||||
uidNumber: 200015
|
||||
loginShell: /bin/bash
|
||||
homeDirectory: /home/jdoe
|
||||
mail: jane.doe@example.com
|
||||
uid: janedoe
|
||||
```
|
||||
|
||||
Compose a user search which returns this user.
|
||||
|
||||
```yaml
|
||||
userSearch:
|
||||
# The directory directly above the user entry.
|
||||
baseDN: cn=users,cn=compat,dc=example,dc=org
|
||||
filter: "(objectClass=posixAccount)"
|
||||
|
||||
# Expect user to enter "janedoe" when logging in.
|
||||
username: uid
|
||||
|
||||
# Use the full DN as an ID.
|
||||
idAttr: DN
|
||||
|
||||
# When an email address is not available, use another value unique to the user, like uid.
|
||||
emailAttr: mail
|
||||
nameAttr: gecos
|
||||
```
|
||||
|
||||
Second, find a group entry.
|
||||
|
||||
```
|
||||
dn: cn=developers,cn=groups,cn=compat,dc=example,dc=org
|
||||
memberUid: janedoe
|
||||
memberUid: johndoe
|
||||
gidNumber: 200115
|
||||
objectClass: posixGroup
|
||||
objectClass: ipaOverrideTarget
|
||||
objectClass: top
|
||||
cn: developers
|
||||
```
|
||||
|
||||
Group searches must match a user attribute to a group attribute. In this example, the search returns users whose uid is found in the group's list of memberUid attributes.
|
||||
|
||||
```yaml
|
||||
groupSearch:
|
||||
# The directory directly above the group entry.
|
||||
baseDN: cn=groups,cn=compat,dc=example,dc=org
|
||||
filter: "(objectClass=posixGroup)"
|
||||
|
||||
# The group search needs to match the "uid" attribute on
|
||||
# the user with the "memberUid" attribute on the group.
|
||||
userMatchers:
|
||||
- userAttr: uid
|
||||
groupAttr: memberUid
|
||||
|
||||
# Unique name of the group.
|
||||
nameAttr: cn
|
||||
```
|
||||
To extract group specific information the `DN` can be used in the `userAttr` field.
|
||||
|
||||
```
|
||||
# Top level object example.coma in LDIF file.
|
||||
dn: dc=example,dc=com
|
||||
objectClass: top
|
||||
objectClass: dcObject
|
||||
objectClass: organization
|
||||
dc: example
|
||||
```
|
||||
|
||||
The following is an example of a group query would match any entry with member=<user DN>:
|
||||
|
||||
```yaml
|
||||
groupSearch:
|
||||
# BaseDN to start the search from. It will translate to the query
|
||||
# "(&(objectClass=group)(member=<user DN>))".
|
||||
baseDN: cn=groups,cn=compat,dc=example,dc=com
|
||||
# Optional filter to apply when searching the directory.
|
||||
filter: "(objectClass=group)"
|
||||
|
||||
userMatchers:
|
||||
- userAttr: DN # Use "DN" here not "uid"
|
||||
groupAttr: member
|
||||
|
||||
nameAttr: name
|
||||
```
|
||||
|
||||
There are cases when different types (objectClass) of groups use different attributes to keep a list of members. Below is an example of group query for such case:
|
||||
|
||||
```yaml
|
||||
groupSearch:
|
||||
baseDN: cn=groups,cn=compat,dc=example,dc=com
|
||||
# Optional filter to search for different group types
|
||||
filter: "(|(objectClass=posixGroup)(objectClass=group))"
|
||||
|
||||
# Use multiple user matchers so Dex will know which attribute names should be used to search for group members
|
||||
userMatchers:
|
||||
- userAttr: uid
|
||||
groupAttr: memberUid
|
||||
- userAttr: DN
|
||||
groupAttr: member
|
||||
|
||||
nameAttr: name
|
||||
```
|
||||
|
||||
## Example: Searching a FreeIPA server with groups
|
||||
|
||||
The following configuration will allow the LDAP connector to search a FreeIPA directory using an LDAP filter.
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: ldap
|
||||
id: ldap
|
||||
name: LDAP
|
||||
config:
|
||||
# host and port of the LDAP server in form "host:port".
|
||||
host: freeipa.example.com:636
|
||||
# freeIPA server's CA
|
||||
rootCA: ca.crt
|
||||
userSearch:
|
||||
# Would translate to the query "(&(objectClass=posixAccount)(uid=<username>))".
|
||||
baseDN: cn=users,dc=freeipa,dc=example,dc=com
|
||||
filter: "(objectClass=posixAccount)"
|
||||
username: uid
|
||||
idAttr: uid
|
||||
# Required. Attribute to map to Email.
|
||||
emailAttr: mail
|
||||
# Entity attribute to map to display name of users.
|
||||
groupSearch:
|
||||
# Would translate to the query "(&(objectClass=group)(member=<user uid>))".
|
||||
baseDN: cn=groups,dc=freeipa,dc=example,dc=com
|
||||
filter: "(objectClass=group)"
|
||||
userMatchers:
|
||||
- userAttr: uid
|
||||
groupAttr: member
|
||||
nameAttr: name
|
||||
```
|
||||
|
||||
If the search finds an entry, it will attempt to use the provided password to bind as that user entry.
|
||||
|
||||
[openldap]: https://www.openldap.org/
|
||||
|
||||
## Example: Searching a Active Directory server with groups
|
||||
|
||||
The following configuration will allow the LDAP connector to search a Active Directory using an LDAP filter.
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: ldap
|
||||
name: ActiveDirectory
|
||||
id: ad
|
||||
config:
|
||||
host: ad.example.com:636
|
||||
|
||||
insecureNoSSL: false
|
||||
insecureSkipVerify: true
|
||||
|
||||
bindDN: cn=Administrator,cn=users,dc=example,dc=com
|
||||
bindPW: admin0!
|
||||
|
||||
usernamePrompt: Email Address
|
||||
|
||||
userSearch:
|
||||
baseDN: cn=Users,dc=example,dc=com
|
||||
filter: "(objectClass=person)"
|
||||
username: userPrincipalName
|
||||
idAttr: DN
|
||||
emailAttr: userPrincipalName
|
||||
nameAttr: cn
|
||||
|
||||
groupSearch:
|
||||
baseDN: cn=Users,dc=example,dc=com
|
||||
filter: "(objectClass=group)"
|
||||
userMatchers:
|
||||
- userAttr: DN
|
||||
groupAttr: member
|
||||
nameAttr: cn
|
||||
```
|
||||
|
|
@ -1,27 +0,0 @@
|
|||
# Authentication through LinkedIn
|
||||
|
||||
## Overview
|
||||
|
||||
One of the login options for dex uses the LinkedIn OAuth2 flow to identify the end user through their LinkedIn account.
|
||||
|
||||
When a client redeems a refresh token through dex, dex will re-query LinkedIn to update user information in the ID Token. To do this, __dex stores a readonly LinkedIn access token in its backing datastore.__ Users that reject dex's access through LinkedIn will also revoke all dex clients which authenticated them through LinkedIn.
|
||||
|
||||
## Configuration
|
||||
|
||||
Register a new application via `My Apps -> Create Application` ensuring the callback URL is `(dex issuer)/callback`. For example if dex is listening at the non-root path `https://auth.example.com/dex` the callback would be `https://auth.example.com/dex/callback`.
|
||||
|
||||
The following is an example of a configuration for `examples/config-dev.yaml`:
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: linkedin
|
||||
# Required field for connector id.
|
||||
id: linkedin
|
||||
# Required field for connector name.
|
||||
name: LinkedIn
|
||||
config:
|
||||
# Credentials can be string literals or pulled from the environment.
|
||||
clientID: $LINKEDIN_APPLICATION_ID
|
||||
clientSecret: $LINKEDIN_CLIENT_SECRET
|
||||
redirectURI: http://127.0.0.1:5556/dex/callback
|
||||
```
|
|
@ -1,118 +0,0 @@
|
|||
# Authentication through Microsoft
|
||||
|
||||
## Overview
|
||||
|
||||
One of the login options for dex uses the Microsoft OAuth2 flow to identify the
|
||||
end user through their Microsoft account.
|
||||
|
||||
When a client redeems a refresh token through dex, dex will re-query Microsoft
|
||||
to update user information in the ID Token. To do this, __dex stores a readonly
|
||||
Microsoft access and refresh tokens in its backing datastore.__ Users that
|
||||
reject dex's access through Microsoft will also revoke all dex clients which
|
||||
authenticated them through Microsoft.
|
||||
|
||||
### Caveats
|
||||
|
||||
`groups` claim in dex is only supported when `tenant` is specified in Microsoft
|
||||
connector config. In order for dex to be able to list groups on behalf of
|
||||
logged in user, an explicit organization administrator consent is required. To
|
||||
obtain the consent do the following:
|
||||
|
||||
- when registering dex application on https://apps.dev.microsoft.com add
|
||||
an explicit `Directory.Read.All` permission to the list of __Delegated
|
||||
Permissions__
|
||||
- open the following link in your browser and log in under organization
|
||||
administrator account:
|
||||
|
||||
`https://login.microsoftonline.com/<tenant>/adminconsent?client_id=<dex client id>`
|
||||
|
||||
## Configuration
|
||||
|
||||
Register a new application on https://apps.dev.microsoft.com via `Add an app`
|
||||
ensuring the callback URL is `(dex issuer)/callback`. For example if dex
|
||||
is listening at the non-root path `https://auth.example.com/dex` the callback
|
||||
would be `https://auth.example.com/dex/callback`.
|
||||
|
||||
The following is an example of a configuration for `examples/config-dev.yaml`:
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: microsoft
|
||||
# Required field for connector id.
|
||||
id: microsoft
|
||||
# Required field for connector name.
|
||||
name: Microsoft
|
||||
config:
|
||||
# Credentials can be string literals or pulled from the environment.
|
||||
clientID: $MICROSOFT_APPLICATION_ID
|
||||
clientSecret: $MICROSOFT_CLIENT_SECRET
|
||||
redirectURI: http://127.0.0.1:5556/dex/callback
|
||||
```
|
||||
|
||||
`tenant` configuration parameter controls what kinds of accounts may be
|
||||
authenticated in dex. By default, all types of Microsoft accounts (consumers
|
||||
and organizations) can authenticate in dex via Microsoft. To change this, set
|
||||
the `tenant` parameter to one of the following:
|
||||
|
||||
- `common`- both personal and business/school accounts can authenticate in dex
|
||||
via Microsoft (default)
|
||||
- `consumers` - only personal accounts can authenticate in dex
|
||||
- `organizations` - only business/school accounts can authenticate in dex
|
||||
- `<tenant uuid>` or `<tenant name>` - only accounts belonging to specific
|
||||
tenant identified by either `<tenant uuid>` or `<tenant name>` can
|
||||
authenticate in dex
|
||||
|
||||
For example, the following snippet configures dex to only allow business/school
|
||||
accounts:
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: microsoft
|
||||
# Required field for connector id.
|
||||
id: microsoft
|
||||
# Required field for connector name.
|
||||
name: Microsoft
|
||||
config:
|
||||
# Credentials can be string literals or pulled from the environment.
|
||||
clientID: $MICROSOFT_APPLICATION_ID
|
||||
clientSecret: $MICROSOFT_CLIENT_SECRET
|
||||
redirectURI: http://127.0.0.1:5556/dex/callback
|
||||
tenant: organizations
|
||||
```
|
||||
|
||||
### Groups
|
||||
|
||||
When the `groups` claim is present in a request to dex __and__ `tenant` is
|
||||
configured, dex will query Microsoft API to obtain a list of groups the user is
|
||||
a member of. `onlySecurityGroups` configuration option restricts the list to
|
||||
include only security groups. By default all groups (security, Office 365,
|
||||
mailing lists) are included.
|
||||
|
||||
By default, dex resolve groups ids to groups names, to keep groups ids, you can
|
||||
specify the configuration option `groupNameFormat: id`.
|
||||
|
||||
It is possible to require a user to be a member of a particular group in order
|
||||
to be successfully authenticated in dex. For example, with the following
|
||||
configuration file only the users who are members of at least one of the listed
|
||||
groups will be able to successfully authenticate in dex:
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: microsoft
|
||||
# Required field for connector id.
|
||||
id: microsoft
|
||||
# Required field for connector name.
|
||||
name: Microsoft
|
||||
config:
|
||||
# Credentials can be string literals or pulled from the environment.
|
||||
clientID: $MICROSOFT_APPLICATION_ID
|
||||
clientSecret: $MICROSOFT_CLIENT_SECRET
|
||||
redirectURI: http://127.0.0.1:5556/dex/callback
|
||||
tenant: myorg.onmicrosoft.com
|
||||
groups:
|
||||
- developers
|
||||
- devops
|
||||
```
|
||||
|
||||
Also, `useGroupsAsWhitelist` configuration option, can restrict the groups
|
||||
claims to include only the user's groups that are in the configured `groups`.
|
|
@ -1,109 +0,0 @@
|
|||
# Authentication through an OpenID Connect provider
|
||||
|
||||
## Overview
|
||||
|
||||
Dex is able to use another OpenID Connect provider as an authentication source. When logging in, dex will redirect to the upstream provider and perform the necessary OAuth2 flows to determine the end users email, username, etc. More details on the OpenID Connect protocol can be found in [_An overview of OpenID Connect_](../openid-connect.md).
|
||||
|
||||
Prominent examples of OpenID Connect providers include Google Accounts, Salesforce, and Azure AD v2 ([not v1][azure-ad-v1]).
|
||||
|
||||
## Caveats
|
||||
|
||||
When using refresh tokens, changes to the upstream claims aren't propagated to the id_token returned by dex. If a user's email changes, the "email" claim returned by dex won't change unless the user logs in again. Progress for this is tracked in [issue #863][issue-863].
|
||||
|
||||
## Configuration
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: oidc
|
||||
id: google
|
||||
name: Google
|
||||
config:
|
||||
# Canonical URL of the provider, also used for configuration discovery.
|
||||
# This value MUST match the value returned in the provider config discovery.
|
||||
#
|
||||
# See: https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig
|
||||
issuer: https://accounts.google.com
|
||||
|
||||
# Connector config values starting with a "$" will read from the environment.
|
||||
clientID: $GOOGLE_CLIENT_ID
|
||||
clientSecret: $GOOGLE_CLIENT_SECRET
|
||||
|
||||
# Dex's issuer URL + "/callback"
|
||||
redirectURI: http://127.0.0.1:5556/callback
|
||||
|
||||
|
||||
# Some providers require passing client_secret via POST parameters instead
|
||||
# of basic auth, despite the OAuth2 RFC discouraging it. Many of these
|
||||
# cases are caught internally, but some may need to uncomment the
|
||||
# following field.
|
||||
#
|
||||
# basicAuthUnsupported: true
|
||||
|
||||
# Google supports whitelisting allowed domains when using G Suite
|
||||
# (Google Apps). The following field can be set to a list of domains
|
||||
# that can log in:
|
||||
#
|
||||
# hostedDomains:
|
||||
# - example.com
|
||||
|
||||
# List of additional scopes to request in token response
|
||||
# Default is profile and email
|
||||
# Full list at https://github.com/dexidp/dex/blob/master/Documentation/custom-scopes-claims-clients.md
|
||||
# scopes:
|
||||
# - profile
|
||||
# - email
|
||||
# - groups
|
||||
|
||||
# Some providers return claims without "email_verified", when they had no usage of emails verification in enrollment process
|
||||
# or if they are acting as a proxy for another IDP etc AWS Cognito with an upstream SAML IDP
|
||||
# This can be overridden with the below option
|
||||
# insecureSkipEmailVerified: true
|
||||
|
||||
# Groups claims (like the rest of oidc claims through dex) only refresh when the id token is refreshed
|
||||
# meaning the regular refresh flow doesn't update the groups claim. As such by default the oidc connector
|
||||
# doesn't allow groups claims. If you are okay with having potentially stale group claims you can use
|
||||
# this option to enable groups claims through the oidc connector on a per-connector basis.
|
||||
# This can be overridden with the below option
|
||||
# insecureEnableGroups: true
|
||||
|
||||
# When enabled, the OpenID Connector will query the UserInfo endpoint for additional claims. UserInfo claims
|
||||
# take priority over claims returned by the IDToken. This option should be used when the IDToken doesn't contain
|
||||
# all the claims requested.
|
||||
# https://openid.net/specs/openid-connect-core-1_0.html#UserInfo
|
||||
# getUserInfo: true
|
||||
|
||||
# The set claim is used as user id.
|
||||
# Claims list at https://openid.net/specs/openid-connect-core-1_0.html#Claims
|
||||
# Default: sub
|
||||
# userIDKey: nickname
|
||||
|
||||
# The set claim is used as user name.
|
||||
# Default: name
|
||||
# userNameKey: nickname
|
||||
|
||||
# For offline_access, the prompt parameter is set by default to "prompt=consent".
|
||||
# However this is not supported by all OIDC providers, some of them support different
|
||||
# value for prompt, like "prompt=login" or "prompt=none"
|
||||
# promptType: consent
|
||||
|
||||
# Some providers return non-standard claims (eg. mail).
|
||||
# Use claimMapping to map those claims to standard claims:
|
||||
# https://openid.net/specs/openid-connect-core-1_0.html#Claims
|
||||
# claimMapping can only map a non-standard claim to a standard one if it's not returned in the id_token.
|
||||
claimMapping:
|
||||
# The set claim is used as preferred username.
|
||||
# Default: preferred_username
|
||||
# preferred_username: other_user_name
|
||||
|
||||
# The set claim is used as email.
|
||||
# Default: email
|
||||
# email: mail
|
||||
|
||||
# The set claim is used as groups.
|
||||
# Default: groups
|
||||
# groups: "cognito:groups"
|
||||
```
|
||||
|
||||
[oidc-doc]: openid-connect.md
|
||||
[issue-863]: https://github.com/dexidp/dex/issues/863
|
||||
[azure-ad-v1]: https://github.com/coreos/go-oidc/issues/133
|
|
@ -1,79 +0,0 @@
|
|||
# Authentication using OpenShift
|
||||
|
||||
## Overview
|
||||
|
||||
Dex can make use of users and groups defined within OpenShift by querying the platform provided OAuth server.
|
||||
|
||||
## Configuration
|
||||
|
||||
|
||||
### Creating an OAuth Client
|
||||
|
||||
Two forms of OAuth Clients can be utilized:
|
||||
|
||||
* [Using a Service Account as an OAuth Client](https://docs.openshift.com/container-platform/latest/authentication/using-service-accounts-as-oauth-client.html) (Recommended)
|
||||
* [Registering An Additional OAuth Client](https://docs.openshift.com/container-platform/latest/authentication/configuring-internal-oauth.html#oauth-register-additional-client_configuring-internal-oauth)
|
||||
|
||||
#### Using a Service Account as an OAuth Client
|
||||
|
||||
OpenShift Service Accounts can be used as a constrained form of OAuth client. Making use of a Service Account to represent an OAuth Client is the recommended option as it does not require elevated privileged within the OpenShift cluster. Create a new Service Account or make use of an existing Service Account.
|
||||
|
||||
Patch the Service Account to add an annotation for location of the Redirect URI
|
||||
|
||||
```
|
||||
oc patch serviceaccount <name> --type='json' -p='[{"op": "add", "path": "/metadata/annotations/serviceaccounts.openshift.io/oauth-redirecturi.dex", "value":"https:///<dex_url>/callback"}]'
|
||||
```
|
||||
|
||||
The Client ID for a Service Account representing an OAuth Client takes the form `system:serviceaccount:<namespace>:<service_account_name>`
|
||||
|
||||
The Client Secret for a Service Account representing an OAuth Client is the long lived OAuth Token that is configued for the Service Account. Execute the following command to retrieve the OAuth Token.
|
||||
|
||||
```
|
||||
oc serviceaccounts get-token <name>
|
||||
```
|
||||
|
||||
#### Registering An Additional OAuth Client
|
||||
|
||||
Instead of using a constrained form of Service Account to represent an OAuth Client, an additional OAuthClient resource can be created.
|
||||
|
||||
Create a new OAuthClient resource similar to the following:
|
||||
|
||||
```yaml
|
||||
kind: OAuthClient
|
||||
apiVersion: oauth.openshift.io/v1
|
||||
metadata:
|
||||
name: dex
|
||||
# The value that should be utilized as the `client_secret`
|
||||
secret: "<clientSecret>"
|
||||
# List of valid addresses for the callback. Ensure one of the values that are provided is `(dex issuer)/callback`
|
||||
redirectURIs:
|
||||
- "https:///<dex_url>/callback"
|
||||
grantMethod: prompt
|
||||
```
|
||||
|
||||
### Dex Configuration
|
||||
|
||||
The following is an example of a configuration for `examples/config-dev.yaml`:
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: openshift
|
||||
# Required field for connector id.
|
||||
id: openshift
|
||||
# Required field for connector name.
|
||||
name: OpenShift
|
||||
config:
|
||||
# OpenShift API
|
||||
issuer: https://api.mycluster.example.com:6443
|
||||
# Credentials can be string literals or pulled from the environment.
|
||||
clientID: $OPENSHIFT_OAUTH_CLIENT_ID
|
||||
clientSecret: $OPENSHIFT_OAUTH_CLIENT_SECRET
|
||||
redirectURI: http://127.0.0.1:5556/dex/
|
||||
# Optional: Specify whether to communicate to OpenShift without validating SSL ceertificates
|
||||
insecureCA: false
|
||||
# Optional: The location of file containing SSL certificates to commmunicate to OpenShift
|
||||
rootCA: /etc/ssl/openshift.pem
|
||||
# Optional list of required groups a user mmust be a member of
|
||||
groups:
|
||||
- users
|
||||
```
|
|
@ -1,115 +0,0 @@
|
|||
# Authentication through SAML 2.0
|
||||
|
||||
## Overview
|
||||
|
||||
The SAML provider allows authentication through the SAML 2.0 HTTP POST binding. The connector maps attribute values in the SAML assertion to user info, such as username, email, and groups.
|
||||
|
||||
The connector uses the value of the `NameID` element as the user's unique identifier which dex assumes is both unique and never changes. Use the `nameIDPolicyFormat` to ensure this is set to a value which satisfies these requirements.
|
||||
|
||||
Unlike some clients which will process unprompted AuthnResponses, dex must send the initial AuthnRequest and validates the response's InResponseTo value.
|
||||
|
||||
## Caveats
|
||||
|
||||
__The connector doesn't support refresh tokens__ since the SAML 2.0 protocol doesn't provide a way to requery a provider without interaction. If the "offline_access" scope is requested, it will be ignored.
|
||||
|
||||
The connector doesn't support signed AuthnRequests or encrypted attributes.
|
||||
|
||||
## Group Filtering
|
||||
|
||||
The SAML Connector supports providing a whitelist of SAML Groups to filter access based on, and when the `groupsattr` is set with a scope including groups, Dex will check for membership based on configured groups in the `allowedGroups` config setting for the SAML connector.
|
||||
|
||||
If `filterGroups` is set to true, any groups _not_ part of `allowedGroups` will be excluded.
|
||||
|
||||
## Configuration
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: saml
|
||||
# Required field for connector id.
|
||||
id: saml
|
||||
# Required field for connector name.
|
||||
name: SAML
|
||||
config:
|
||||
# SSO URL used for POST value.
|
||||
ssoURL: https://saml.example.com/sso
|
||||
|
||||
# CA to use when validating the signature of the SAML response.
|
||||
ca: /path/to/ca.pem
|
||||
|
||||
# Dex's callback URL.
|
||||
#
|
||||
# If the response assertion status value contains a Destination element, it
|
||||
# must match this value exactly.
|
||||
#
|
||||
# This is also used as the expected audience for AudienceRestriction elements
|
||||
# if entityIssuer isn't specified.
|
||||
redirectURI: https://dex.example.com/callback
|
||||
|
||||
# Name of attributes in the returned assertions to map to ID token claims.
|
||||
usernameAttr: name
|
||||
emailAttr: email
|
||||
groupsAttr: groups # optional
|
||||
|
||||
# List of groups to filter access based on membership
|
||||
# allowedGroups
|
||||
# - Admins
|
||||
|
||||
# CA's can also be provided inline as a base64'd blob.
|
||||
#
|
||||
# caData: ( RAW base64'd PEM encoded CA )
|
||||
|
||||
# To skip signature validation, uncomment the following field. This should
|
||||
# only be used during testing and may be removed in the future.
|
||||
#
|
||||
# insecureSkipSignatureValidation: true
|
||||
|
||||
# Optional: Manually specify dex's Issuer value.
|
||||
#
|
||||
# When provided dex will include this as the Issuer value during AuthnRequest.
|
||||
# It will also override the redirectURI as the required audience when evaluating
|
||||
# AudienceRestriction elements in the response.
|
||||
entityIssuer: https://dex.example.com/callback
|
||||
|
||||
# Optional: Issuer value expected in the SAML response.
|
||||
ssoIssuer: https://saml.example.com/sso
|
||||
|
||||
# Optional: Delimiter for splitting groups returned as a single string.
|
||||
#
|
||||
# By default, multiple groups are assumed to be represented as multiple
|
||||
# attributes with the same name.
|
||||
#
|
||||
# If "groupsDelim" is provided groups are assumed to be represented as a
|
||||
# single attribute and the delimiter is used to split the attribute's value
|
||||
# into multiple groups.
|
||||
groupsDelim: ", "
|
||||
|
||||
# Optional: Requested format of the NameID.
|
||||
#
|
||||
# The NameID value is is mapped to the user ID of the user. This can be an
|
||||
# abbreviated form of the full URI with just the last component. For example,
|
||||
# if this value is set to "emailAddress" the format will resolve to:
|
||||
#
|
||||
# urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
|
||||
#
|
||||
# If no value is specified, this value defaults to:
|
||||
#
|
||||
# urn:oasis:names:tc:SAML:2.0:nameid-format:persistent
|
||||
#
|
||||
nameIDPolicyFormat: persistent
|
||||
```
|
||||
|
||||
A minimal working configuration might look like:
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: saml
|
||||
id: okta
|
||||
name: Okta
|
||||
config:
|
||||
ssoURL: https://dev-111102.oktapreview.com/app/foo/exk91cb99lKkKSYoy0h7/sso/saml
|
||||
ca: /etc/dex/saml-ca.pem
|
||||
redirectURI: http://127.0.0.1:5556/dex/callback
|
||||
usernameAttr: name
|
||||
emailAttr: email
|
||||
groupsAttr: groups
|
||||
```
|
|
@ -1,100 +0,0 @@
|
|||
# Custom scopes, claims and client features
|
||||
|
||||
This document describes the set of OAuth2 and OpenID Connect features implemented by dex.
|
||||
|
||||
## Scopes
|
||||
|
||||
The following is the exhaustive list of scopes supported by dex:
|
||||
|
||||
| Name | Description |
|
||||
| ---- | ------------|
|
||||
| `openid` | Required scope for all login requests. |
|
||||
| `email` | ID token claims should include the end user's email and if that email was verified by an upstream provider. |
|
||||
| `profile` | ID token claims should include the username of the end user. |
|
||||
| `groups` | ID token claims should include a list of groups the end user is a member of. |
|
||||
| `federated:id` | ID token claims should include information from the ID provider. The token will contain the connector ID and the user ID assigned at the provider. |
|
||||
| `offline_access` | Token response should include a refresh token. Doesn't work in combinations with some connectors, notability the [SAML connector][saml-connector] ignores this scope. |
|
||||
| `audience:server:client_id:( client-id )` | Dynamic scope indicating that the ID token should be issued on behalf of another client. See the _"Cross-client trust and authorized party"_ section below. |
|
||||
|
||||
## Custom claims
|
||||
|
||||
Beyond the [required OpenID Connect claims][core-claims], and a handful of [standard claims][standard-claims], dex implements the following non-standard claims.
|
||||
|
||||
| Name | Description |
|
||||
| ---- | ------------|
|
||||
| `groups` | A list of strings representing the groups a user is a member of. |
|
||||
| `federated_claims` | The connector ID and the user ID assigned to the user at the provider. |
|
||||
| `email` | The email of the user. |
|
||||
| `email_verified` | If the upstream provider has verified the email. |
|
||||
| `name` | User's display name. |
|
||||
|
||||
The `federated_claims` claim has the following format:
|
||||
|
||||
```json
|
||||
"federated_claims": {
|
||||
"connector_id": "github",
|
||||
"user_id": "110272483197731336751"
|
||||
}
|
||||
```
|
||||
|
||||
## Cross-client trust and authorized party
|
||||
|
||||
Dex has the ability to issue ID tokens to clients on behalf of other clients. In OpenID Connect terms, this means the ID token's `aud` (audience) claim being a different client ID than the client that performed the login.
|
||||
|
||||
For example, this feature could be used to allow a web app to generate an ID token on behalf of a command line tool:
|
||||
|
||||
```yaml
|
||||
staticClients:
|
||||
- id: web-app
|
||||
redirectURIs:
|
||||
- 'https://web-app.example.com/callback'
|
||||
name: 'Web app'
|
||||
secret: web-app-secret
|
||||
|
||||
- id: cli-app
|
||||
redirectURIs:
|
||||
- 'https://cli-app.example.com/callback'
|
||||
name: 'Command line tool'
|
||||
secret: cli-app-secret
|
||||
# The command line tool lets the web app issue ID tokens on its behalf.
|
||||
trustedPeers:
|
||||
- web-app
|
||||
```
|
||||
|
||||
Note that the command line tool must explicitly trust the web app using the `trustedPeers` field. The web app can then use the following scope to request an ID token that's issued for the command line tool.
|
||||
|
||||
```
|
||||
audience:server:client_id:cli-app
|
||||
```
|
||||
|
||||
The ID token claims will then include the following audience and authorized party:
|
||||
|
||||
```
|
||||
{
|
||||
"aud": "cli-app",
|
||||
"azp": "web-app",
|
||||
"email": "foo@bar.com",
|
||||
// other claims...
|
||||
}
|
||||
```
|
||||
|
||||
## Public clients
|
||||
|
||||
Public clients are inspired by Google's [_"Installed Applications"_][installed-apps] and are meant to impose restrictions on applications that don't intend to keep their client secret private. Clients can be declared as public using the `public` config option.
|
||||
|
||||
```yaml
|
||||
staticClients:
|
||||
- id: cli-app
|
||||
public: true
|
||||
name: 'CLI app'
|
||||
secret: cli-app-secret
|
||||
```
|
||||
|
||||
Instead of traditional redirect URIs, public clients are limited to either redirects that begin with "http://localhost" or a special "out-of-browser" URL "urn:ietf:wg:oauth:2.0:oob". The latter triggers dex to display the OAuth2 code in the browser, prompting the end user to manually copy it to their app. It's the client's responsibility to either create a screen or a prompt to receive the code, then perform a code exchange for a token response.
|
||||
|
||||
When using the "out-of-browser" flow, an ID Token nonce is strongly recommended.
|
||||
|
||||
[saml-connector]: saml-connector.md
|
||||
[core-claims]: https://openid.net/specs/openid-connect-core-1_0.html#IDToken
|
||||
[standard-claims]: https://openid.net/specs/openid-connect-core-1_0.html#StandardClaims
|
||||
[installed-apps]: https://developers.google.com/api-client-library/python/auth/installed-app
|
|
@ -1,17 +0,0 @@
|
|||
# Join the fun -- become a maintainer!
|
||||
|
||||
If a person or their company uses dex, has demonstrated an understanding of this
|
||||
project (either by submitting PRs to dex or related projects such as Helm
|
||||
charts), and the ability to work productively with the community, that person
|
||||
can have write access to this repo. We want to be liberal with this privilege
|
||||
and enable companies using dex to have a voice in its development.
|
||||
|
||||
The first 10 PRs by new maintainers must be approved by a maintainer from a
|
||||
different company.
|
||||
|
||||
Access to https://quay.io/dexidp will be restricted to @srenatus, @rithujohn191
|
||||
and @ericchiang to prevent new maintainers from being able to unilaterally push
|
||||
images.
|
||||
|
||||
If you would like access, please email @ericchiang at ericchiang@google.com
|
||||
stating your case or open a public issue. Come join the fun 😃
|
|
@ -1,29 +0,0 @@
|
|||
# Managing dependencies
|
||||
|
||||
## Go modules
|
||||
|
||||
Dex uses [Go modules][go-modules] to manage its dependencies. Go 1.11 or higher is recommended. While Go 1.12 is expected to finalize the Go modules feature, with Go 1.11 you should [activate the Go modules feature][go-modules-activate] before interacting with Go modules.
|
||||
|
||||
Here is one way to activate the Go modules feature with Go 1.11.
|
||||
|
||||
```
|
||||
export GO111MODULE=on # manually active module mode
|
||||
```
|
||||
|
||||
You should become familiar with [module-aware `go get`][module-aware-go-get] as it can be used to add version-pinned dependencies out of band of the typical `go mod tidy -v` workflow.
|
||||
|
||||
## Adding dependencies
|
||||
|
||||
To add a new dependency to dex or update an existing one:
|
||||
|
||||
1. Make changes to dex's source code importing the new dependency.
|
||||
2. You have at least three options as to how to update `go.mod` to reflect the new dependency:
|
||||
* Run `go mod tidy -v`. This is a good option if you do not wish to immediately pin to a specific Semantic Version or commit.
|
||||
* Run, for example, `go get <package-name>@<commit-hash>`. This is a good option when you want to immediately pin to a specific Semantic Version or commit.
|
||||
* Manually update `go.mod`. If one of the two options above doesn't suit you, do this -- but very carefully.
|
||||
3. Create a git commit to reflect your code changes.
|
||||
|
||||
|
||||
[go-modules]: https://github.com/golang/go/wiki/Modules
|
||||
[go-modules-activate]: https://github.com/golang/go/wiki/Modules#how-to-install-and-activate-module-support
|
||||
[module-aware-go-get]: https://tip.golang.org/cmd/go/#hdr-Module_aware_go_get
|
|
@ -1,144 +0,0 @@
|
|||
# Running integration tests
|
||||
|
||||
## Postgres
|
||||
|
||||
Running database tests locally requires:
|
||||
|
||||
* Docker
|
||||
|
||||
To run the database integration tests:
|
||||
|
||||
- start a postgres container:
|
||||
|
||||
`docker run --name dex-postgres -e POSTGRES_USER=postgres -e POSTGRES_DB=dex -p 5432:5432 -d postgres:11`
|
||||
- export the required environment variables:
|
||||
|
||||
`export DEX_POSTGRES_DATABASE=dex DEX_POSTGRES_USER=postgres DEX_POSTGRES_PASSWORD=postgres DEX_POSTGRES_HOST=127.0.0.1:5432`
|
||||
|
||||
- run the storage/sql tests:
|
||||
|
||||
```
|
||||
$ # sqlite3 takes forever to compile, be sure to install test dependencies
|
||||
$ go test -v -i ./storage/sql
|
||||
$ go test -v ./storage/sql
|
||||
```
|
||||
|
||||
- clean up the postgres container: `docker rm -f dex-postgres`
|
||||
|
||||
## Etcd
|
||||
|
||||
These tests can also be executed using docker:
|
||||
|
||||
- start the container (where `NODE1` is set to the host IP address):
|
||||
|
||||
```
|
||||
$ export NODE1=0.0.0.0
|
||||
$ docker run --name dex-etcd -p 2379:2379 -p 2380:2380 gcr.io/etcd-development/etcd:v3.3.10 \
|
||||
/usr/local/bin/etcd --name node1 \
|
||||
--initial-advertise-peer-urls http://${NODE1}:2380 --listen-peer-urls http://${NODE1}:2380 \
|
||||
--advertise-client-urls http://${NODE1}:2379 --listen-client-urls http://${NODE1}:2379 \
|
||||
--initial-cluster node1=http://${NODE1}:2380
|
||||
```
|
||||
|
||||
- run the tests, passing the correct endpoint for this etcd instance in `DEX_ETCD_ENDPOINTS`:
|
||||
|
||||
`DEX_ETCD_ENDPOINTS=http://localhost:2379 go test -v ./storage/etcd`
|
||||
- clean up the etcd container: `docker rm -f dex-etcd`
|
||||
|
||||
## LDAP
|
||||
|
||||
The LDAP integration tests require [OpenLDAP][openldap] installed on the host machine. To run them, use `go test`:
|
||||
|
||||
```
|
||||
export DEX_LDAP_TESTS=1
|
||||
go test -v ./connector/ldap/
|
||||
```
|
||||
|
||||
To quickly stand up a LDAP server for development, see the LDAP [_"Getting started"_][ldap-getting-started] example. This also requires OpenLDAP installed on the host.
|
||||
|
||||
To stand up a containerized LDAP server run the OpenLDAP docker image:
|
||||
|
||||
```
|
||||
$ sudo docker run --hostname ldap.example.org --name openldap-container --detach osixia/openldap:1.1.6
|
||||
```
|
||||
|
||||
By default TLS is enabled and a certificate is created with the container hostname, which in this case is "ldap.example.org". It will create an empty LDAP for the company Example Inc. and the domain example.org. By default the admin has the password admin.
|
||||
|
||||
Add new users and groups (sample .ldif file included at the end):
|
||||
|
||||
```
|
||||
$ sudo docker exec openldap-container ldapadd -x -D "cn=admin,dc=example,dc=org" -w admin -f <path to .ldif> -h ldap.example.org -ZZ
|
||||
```
|
||||
|
||||
Verify that the added entries are in your directory with ldapsearch :
|
||||
|
||||
```
|
||||
$ sudo docker exec openldap-container ldapsearch -x -h localhost -b dc=example,dc=org -D "cn=admin,dc=example,dc=org" -w admin
|
||||
```
|
||||
The .ldif file should contain seed data. Example file contents:
|
||||
|
||||
```
|
||||
dn: cn=Test1,dc=example,dc=org
|
||||
objectClass: organizationalRole
|
||||
cn: Test1
|
||||
|
||||
dn: cn=Test2,dc=example,dc=org
|
||||
objectClass: organizationalRole
|
||||
cn: Test2
|
||||
|
||||
dn: ou=groups,dc=example,dc=org
|
||||
ou: groups
|
||||
objectClass: top
|
||||
objectClass: organizationalUnit
|
||||
|
||||
dn: cn=tstgrp,ou=groups,dc=example,dc=org
|
||||
objectClass: top
|
||||
objectClass: groupOfNames
|
||||
member: cn=Test1,dc=example,dc=org
|
||||
cn: tstgrp
|
||||
```
|
||||
|
||||
## SAML
|
||||
|
||||
### Okta
|
||||
|
||||
The Okta identity provider supports free accounts for developers to test their implementation against. This document describes configuring an Okta application to test dex's SAML connector.
|
||||
|
||||
First, [sign up for a developer account][okta-sign-up]. Then, to create a SAML application:
|
||||
|
||||
* Go to the admin screen.
|
||||
* Click "Add application"
|
||||
* Click "Create New App"
|
||||
* Choose "SAML 2.0" and press "Create"
|
||||
* Configure SAML
|
||||
* Enter `http://127.0.0.1:5556/dex/callback` for "Single sign on URL"
|
||||
* Enter `http://127.0.0.1:5556/dex/callback` for "Audience URI (SP Entity ID)"
|
||||
* Under "ATTRIBUTE STATEMENTS (OPTIONAL)" add an "email" and "name" attribute. The values should be something like `user:email` and `user:firstName`, respectively.
|
||||
* Under "GROUP ATTRIBUTE STATEMENTS (OPTIONAL)" add a "groups" attribute. Use the "Regexp" filter `.*`.
|
||||
|
||||
After the application's created, assign yourself to the app.
|
||||
|
||||
* "Applications" > "Applications"
|
||||
* Click on your application then under the "People" tab press the "Assign to People" button and add yourself.
|
||||
|
||||
At the app, go to the "Sign On" tab and then click "View Setup Instructions". Use those values to fill out the following connector in `examples/config-dev.yaml`.
|
||||
|
||||
```yaml
|
||||
connectors:
|
||||
- type: saml
|
||||
id: saml
|
||||
name: Okta
|
||||
config:
|
||||
ssoURL: ( "Identity Provider Single Sign-On URL" )
|
||||
caData: ( base64'd value of "X.509 Certificate" )
|
||||
redirectURI: http://127.0.0.1:5556/dex/callback
|
||||
usernameAttr: name
|
||||
emailAttr: email
|
||||
groupsAttr: groups
|
||||
```
|
||||
|
||||
Start both dex and the example app, and try logging in (requires not requesting a refresh token).
|
||||
|
||||
[okta-sign-up]: https://www.okta.com/developer/signup/
|
||||
[openldap]: https://www.openldap.org/
|
||||
[ldap-getting-started]: ldap-connector.md#getting-started
|
|
@ -1,65 +0,0 @@
|
|||
# Releases
|
||||
|
||||
Making a dex release involves:
|
||||
|
||||
* Tagging a git commit and pushing the tag to GitHub.
|
||||
|
||||
From this, Quay will build and tag an image via a build trigger.
|
||||
|
||||
This requires the following permissions.
|
||||
|
||||
* Push access to the github.com/dexidp/dex git repo.
|
||||
|
||||
## Tagging the release
|
||||
|
||||
Make sure you've [uploaded your GPG key](https://github.com/settings/keys) and
|
||||
configured git to [use that signing key](
|
||||
https://git-scm.com/book/en/v2/Git-Tools-Signing-Your-Work) either globally or
|
||||
for the Dex repo. Note that the email the key is issued for must be the email
|
||||
you use for git.
|
||||
|
||||
```
|
||||
git config [--global] user.signingkey "{{ GPG key ID }}"
|
||||
git config [--global] user.email "{{ Email associated with key }}"
|
||||
```
|
||||
|
||||
Create a signed tag at the commit you wish to release. This action will prompt
|
||||
you to enter a tag message, which can just be the release version.
|
||||
|
||||
```
|
||||
git tag -s v2.0.0 ea4c04fde83bd6c48f4d43862c406deb4ea9dba2
|
||||
```
|
||||
|
||||
Push that tag to the Dex repo.
|
||||
|
||||
```
|
||||
git push git@github.com:dexidp/dex.git v2.0.0
|
||||
```
|
||||
|
||||
Draft releases on GitHub and summarize the changes since the last release. See
|
||||
previous releases for the expected format.
|
||||
|
||||
https://github.com/dexidp/dex/releases
|
||||
|
||||
## Minor releases - create a branch
|
||||
|
||||
If the release is a minor release (2.1.0, 2.2.0, etc.) create a branch for future patch releases.
|
||||
|
||||
```bash
|
||||
git checkout -b v2.1.x tags/v2.1.0
|
||||
git push git@github.com:dexidp/dex.git v2.1.x
|
||||
```
|
||||
|
||||
## Patch releases - cherry pick required commits
|
||||
|
||||
If the release is a patch release (2.0.1, 2.0.2, etc.) checkout the desired release branch and cherry pick specific commits. A patch release is only meant for urgent bug or security fixes.
|
||||
|
||||
```bash
|
||||
RELEASE_BRANCH="v2.0.x"
|
||||
git checkout $RELEASE_BRANCH
|
||||
git checkout -b "cherry-picked-change"
|
||||
git cherry-pick (SHA of change)
|
||||
git push origin "cherry-picked-change"
|
||||
```
|
||||
|
||||
Open a PR onto $RELEASE_BRANCH to get the changes approved.
|
|
@ -1,53 +0,0 @@
|
|||
# Getting started
|
||||
|
||||
## Building the dex binary
|
||||
|
||||
Dex requires a Go installation and a GOPATH configured. For setting up a Go workspace, refer to the [official documentation][go-setup]. Clone it down the correct place, and simply type `make` to compile the dex binary.
|
||||
|
||||
```
|
||||
$ go get github.com/dexidp/dex
|
||||
$ cd $GOPATH/src/github.com/dexidp/dex
|
||||
$ make
|
||||
```
|
||||
|
||||
## Configuration
|
||||
|
||||
Dex exclusively pulls configuration options from a config file. Use the [example config][example-config] file found in the `examples/` directory to start an instance of dex with an in-memory data store and a set of predefined OAuth2 clients.
|
||||
|
||||
```
|
||||
./bin/dex serve examples/config-dev.yaml
|
||||
```
|
||||
|
||||
The [example config][example-config] file documents many of the configuration options through inline comments. For extra config options, look at that file.
|
||||
|
||||
## Running a client
|
||||
|
||||
Dex operates like most other OAuth2 providers. Users are redirected from a client app to dex to login. Dex ships with an example client app (built with the `make examples` command), for testing and demos.
|
||||
|
||||
By default, the example client is configured with the same OAuth2 credentials defined in `examples/config-dev.yaml` to talk to dex. Running the example app will cause it to query dex's [discovery endpoint][oidc-discovery] and determine the OAuth2 endpoints.
|
||||
|
||||
```
|
||||
./bin/example-app
|
||||
```
|
||||
|
||||
Login to dex through the example app using the following steps.
|
||||
|
||||
1. Navigate to the example app in your browser at http://localhost:5555/ in your browser.
|
||||
2. Hit "login" on the example app to be redirected to dex.
|
||||
3. Choose the "Login with Email" and enter "admin@example.com" and "password"
|
||||
4. Approve the example app's request.
|
||||
5. See the resulting token the example app claims from dex.
|
||||
|
||||
## Further reading
|
||||
|
||||
Dex is generally used as a building block to drive authentication for other apps. See [_"Writing apps that use dex"_][using-dex] for an overview of instrumenting apps to work with dex.
|
||||
|
||||
For a primer on using LDAP to back dex's user store, see the OpenLDAP [_"Getting started"_][ldap-getting-started] example.
|
||||
|
||||
Check out the Documentation directory for further reading on setting up different storages, interacting with the dex API, intros for OpenID Connect, and logging in through other identity providers such as Google, GitHub, or LDAP.
|
||||
|
||||
[go-setup]: https://golang.org/doc/install
|
||||
[example-config]: ../examples/config-dev.yaml
|
||||
[oidc-discovery]: https://openid.net/specs/openid-connect-discovery-1_0-17.html#ProviderMetadata
|
||||
[using-dex]: using-dex.md
|
||||
[ldap-getting-started]: ldap-connector.md#getting-started
|
|
@ -1 +0,0 @@
|
|||
This document has moved to [connectors/github.md](connectors/github.md).
|
|
@ -1 +0,0 @@
|
|||
This document has moved to [connectors/gitlab.md](connectors/gitlab.md).
|
|
@ -1,6 +0,0 @@
|
|||
# Integrations
|
||||
This document tracks the libraries and tools that are compatible with dex. [Join the community](https://github.com/dexidp/dex/), and help us keep the list up-to-date.
|
||||
|
||||
## Tools
|
||||
|
||||
## Projects with a dex dependency
|
|
@ -1,194 +0,0 @@
|
|||
# Kubernetes authentication through dex
|
||||
|
||||
## Overview
|
||||
|
||||
This document covers setting up the [Kubernetes OpenID Connect token authenticator plugin][k8s-oidc] with dex.
|
||||
It also contains a worked example showing how the Dex server can be deployed within Kubernetes.
|
||||
|
||||
Token responses from OpenID Connect providers include a signed JWT called an ID Token. ID Tokens contain names, emails, unique identifiers, and in dex's case, a set of groups that can be used to identify the user. OpenID Connect providers, like dex, publish public keys; the Kubernetes API server understands how to use these to verify ID Tokens.
|
||||
|
||||
The authentication flow looks like:
|
||||
|
||||
1. OAuth2 client logs a user in through dex.
|
||||
2. That client uses the returned ID Token as a bearer token when talking to the Kubernetes API.
|
||||
3. Kubernetes uses dex's public keys to verify the ID Token.
|
||||
4. A claim designated as the username (and optionally group information) will be associated with that request.
|
||||
|
||||
Username and group information can be combined with Kubernetes [authorization plugins][k8s-authz], such as role based access control (RBAC), to enforce policy.
|
||||
|
||||
## Configuring the OpenID Connect plugin
|
||||
|
||||
Configuring the API server to use the OpenID Connect [authentication plugin][k8s-oidc] requires:
|
||||
|
||||
* Deploying an API server with specific flags.
|
||||
* Dex is running on HTTPS.
|
||||
* Custom CA files must be accessible by the API server.
|
||||
* Dex is accessible to both your browser and the Kubernetes API server.
|
||||
|
||||
Use the following flags to point your API server(s) at dex. `dex.example.com` should be replaced by whatever DNS name or IP address dex is running under.
|
||||
|
||||
```
|
||||
--oidc-issuer-url=https://dex.example.com:32000
|
||||
--oidc-client-id=example-app
|
||||
--oidc-ca-file=/etc/ssl/certs/openid-ca.pem
|
||||
--oidc-username-claim=email
|
||||
--oidc-groups-claim=groups
|
||||
```
|
||||
|
||||
Additional notes:
|
||||
|
||||
* The API server configured with OpenID Connect flags doesn't require dex to be available upfront.
|
||||
* Other authenticators, such as client certs, can still be used.
|
||||
* Dex doesn't need to be running when you start your API server.
|
||||
* Kubernetes only trusts ID Tokens issued to a single client.
|
||||
* As a work around dex allows clients to [trust other clients][trusted-peers] to mint tokens on their behalf.
|
||||
* If a claim other than "email" is used for username, for example "sub", it will be prefixed by `"(value of --oidc-issuer-url)#"`. This is to namespace user controlled claims which may be used for privilege escalation.
|
||||
* The `/etc/ssl/certs/openid-ca.pem` used here is the CA from the [generated TLS assets](#generate-tls-assets), and is assumed to be present on the cluster nodes.
|
||||
|
||||
## Deploying dex on Kubernetes
|
||||
|
||||
The dex repo contains scripts for running dex on a Kubernetes cluster with authentication through GitHub. The dex service is exposed using a [node port][node-port] on port 32000. This likely requires a custom `/etc/hosts` entry pointed at one of the cluster's workers.
|
||||
|
||||
Because dex uses [CRDs](https://kubernetes.io/docs/tasks/access-kubernetes-api/custom-resources/custom-resource-definitions/) to store state, no external database is needed. For more details see the [storage documentation](storage.md#kubernetes-custom-resource-definitions-crds).
|
||||
|
||||
There are many different ways to spin up a Kubernetes development cluster, each with different host requirements and support for API server reconfiguration. At this time, this guide does not have copy-pastable examples, but can recommend the following methods for spinning up a cluster:
|
||||
|
||||
* [coreos-kubernetes][coreos-kubernetes] repo for vagrant and VirtualBox users.
|
||||
* [coreos-baremetal][coreos-baremetal] repo for Linux QEMU/KVM users.
|
||||
|
||||
To run dex on Kubernetes perform the following steps:
|
||||
|
||||
1. Generate TLS assets for dex.
|
||||
2. Spin up a Kubernetes cluster with the appropriate flags and CA volume mount.
|
||||
3. Create secrets for TLS and for your [GitHub OAuth2 client credentials][github-oauth2].
|
||||
4. Deploy dex.
|
||||
|
||||
### Generate TLS assets
|
||||
|
||||
Running Dex with HTTPS enabled requires a valid SSL certificate, and the API server needs to trust the certificate of the signing CA using the `--oidc-ca-file` flag.
|
||||
|
||||
For our example use case, the TLS assets can be created using the following command:
|
||||
|
||||
```
|
||||
$ cd examples/k8s
|
||||
$ ./gencert.sh
|
||||
```
|
||||
|
||||
This will generate several files under the `ssl` directory, the important ones being `cert.pem` ,`key.pem` and `ca.pem`. The generated SSL certificate is for 'dex.example.com', although you could change this by editing `gencert.sh` if required.
|
||||
|
||||
### Configure the API server
|
||||
|
||||
#### Ensure the CA certificate is available to the API server
|
||||
|
||||
|
||||
The CA file which was used to sign the SSL certificates for Dex needs to be copied to a location where the API server can read it, and the API server configured to look for it with the flag `--oidc-ca-file`.
|
||||
|
||||
There are several options here but if you run your API server as a container probably the easiest method is to use a [hostPath](https://kubernetes.io/docs/concepts/storage/volumes/#hostpath) volume to mount the CA file directly from the host.
|
||||
|
||||
The example pod manifest below assumes that you copied the CA file into `/etc/ssl/certs`. Adjust as necessary:
|
||||
|
||||
```
|
||||
spec:
|
||||
containers:
|
||||
|
||||
[...]
|
||||
|
||||
volumeMounts:
|
||||
- mountPath: /etc/ssl/certs
|
||||
name: etc-ssl-certs
|
||||
readOnly: true
|
||||
|
||||
[...]
|
||||
|
||||
volumes:
|
||||
- name: ca-certs
|
||||
hostPath:
|
||||
path: /etc/ssl/certs
|
||||
type: DirectoryOrCreate
|
||||
```
|
||||
|
||||
Depending on your installation you may also find that certain folders are already mounted in this way and that you can simply copy the CA file into an existing folder for the same effect.
|
||||
|
||||
#### Configure API server flags
|
||||
|
||||
Configure the API server as in [Configuring the OpenID Connect Plugin](#configuring-the-openid-connect-plugin) above.
|
||||
|
||||
Note that the `ca.pem` from above has been renamed to `openid-ca.pem` in this example - this is just to separate it from any other CA certificates that may be in use.
|
||||
|
||||
### Create cluster secrets
|
||||
|
||||
Once the cluster is up and correctly configured, use kubectl to add the serving certs as secrets.
|
||||
|
||||
```
|
||||
$ kubectl create secret tls dex.example.com.tls --cert=ssl/cert.pem --key=ssl/key.pem
|
||||
```
|
||||
|
||||
Then create a secret for the GitHub OAuth2 client.
|
||||
|
||||
```
|
||||
$ kubectl create secret \
|
||||
generic github-client \
|
||||
--from-literal=client-id=$GITHUB_CLIENT_ID \
|
||||
--from-literal=client-secret=$GITHUB_CLIENT_SECRET
|
||||
```
|
||||
|
||||
### Deploy the Dex server
|
||||
|
||||
Create the dex deployment, configmap, and node port service. This will also create RBAC bindings allowing the Dex pod access to manage [Custom Resource Definitions](storage.md#kubernetes-custom-resource-definitions-crds) within Kubernetes.
|
||||
|
||||
```
|
||||
$ kubectl create -f dex.yaml
|
||||
```
|
||||
|
||||
## Logging into the cluster
|
||||
|
||||
The `example-app` can be used to log into the cluster and get an ID Token. To build the app, run the following commands:
|
||||
|
||||
```bash
|
||||
cd examples/example-app
|
||||
go install .
|
||||
```
|
||||
|
||||
To build the `example-app` requires at least a 1.7 version of Go.
|
||||
|
||||
```bash
|
||||
$ example-app --issuer https://dex.example.com:32000 --issuer-root-ca examples/k8s/ssl/ca.pem
|
||||
```
|
||||
|
||||
Please note that the `example-app` will listen at http://127.0.0.1:5555 and can be changed with the `--listen` flag.
|
||||
|
||||
Once the example app is running, open a browser and go to http://127.0.0.1:5555
|
||||
|
||||
A page appears with fields such as scope and client-id. For the most basic case these are not required, so leave the form blank. Click login.
|
||||
|
||||
On the next page, choose the GitHub option and grant access to dex to view your profile.
|
||||
|
||||
The default redirect uri is http://127.0.0.1:5555/callback and can be changed with the `--redirect-uri` flag and should correspond with your configmap.
|
||||
|
||||
Please note the redirect uri is different from the one you filled when creating `GitHub OAuth2 client credentials`.
|
||||
When you login, GitHub first redirects to dex (https://dex.example.com:32000/callback), then dex redirects to the redirect uri of example-app.
|
||||
|
||||
The printed "ID Token" can then be used as a bearer token to authenticate against the API server.
|
||||
|
||||
```
|
||||
$ token='(id token)'
|
||||
$ curl -H "Authorization: Bearer $token" -k https://( API server host ):443/api/v1/nodes
|
||||
```
|
||||
|
||||
In the kubeconfig file ~/.kube/config, the format is:
|
||||
```
|
||||
users:
|
||||
- name: (USERNAME)
|
||||
user:
|
||||
token: (ID-TOKEN)
|
||||
```
|
||||
|
||||
[k8s-authz]: http://kubernetes.io/docs/admin/authorization/
|
||||
[k8s-oidc]: http://kubernetes.io/docs/admin/authentication/#openid-connect-tokens
|
||||
[trusted-peers]: https://godoc.org/github.com/dexidp/dex/storage#Client
|
||||
[coreos-kubernetes]: https://github.com/coreos/coreos-kubernetes/
|
||||
[coreos-baremetal]: https://github.com/coreos/coreos-baremetal/
|
||||
[github-oauth2]: https://github.com/settings/applications/new
|
||||
[node-port]: http://kubernetes.io/docs/user-guide/services/#type-nodeport
|
||||
[coreos-kubernetes]: https://github.com/coreos/coreos-kubernetes
|
||||
[coreos-baremetal]: https://github.com/coreos/coreos-baremetal
|
|
@ -1 +0,0 @@
|
|||
This document has moved to [connectors/ldap.md](connectors/ldap.md).
|
|
@ -1 +0,0 @@
|
|||
This document has moved to [connectors/linkedin.md](connectors/linkedin.md).
|
|
@ -1 +0,0 @@
|
|||
This document has moved to [connectors/microsoft.md](connectors/microsoft.md).
|
|
@ -1,176 +0,0 @@
|
|||
# OpenID Connect Provider Certification
|
||||
|
||||
The OpenID Foundation provides a set of [conformance test profiles][oidc-conf-profiles] that test both Relying Party and OpenID Provider (OP) OpenID Connect implementations. Upon submission of [results][oidc-result-submission] and an affirmative response, the affirmed OP will be listed as a [certified OP][oidc-certified-ops] on the OpenID Connect website and allowed to use the [certification mark][oidc-cert-mark] according to the certification [terms and conditions][oidc-terms-conds], section 3(d).
|
||||
|
||||
## Basic OpenID Provider Tests
|
||||
|
||||
Dex is an OP that strives to implement the [mandatory set][oidc-core-spec-mandatory] of OpenID Connect features, and can be tested against the Basic OpenID Provider profile ([profile outline][oidc-conf-profiles], section 2.1.1). These tests ensure that all features required by a [basic client][oidc-basic-client-spec] work as expected.
|
||||
|
||||
Features are currently under development to fully comply with the Basic profile, as dex currently does not. The following issues track our progress:
|
||||
|
||||
Issue number | Relates to
|
||||
:---: | :---:
|
||||
[\#376][dex-issue-376] | userinfo_endpoint
|
||||
[\#1052][dex-issue-1052] | auth_time
|
||||
|
||||
[dex-issue-376]: https://github.com/dexidp/dex/issues/376
|
||||
[dex-issue-1052]: https://github.com/dexidp/dex/issues/1052
|
||||
|
||||
### Setup
|
||||
|
||||
There are two ways to set up an OpenID test instance:
|
||||
1. Configure a test instance provided by The OpenID Foundation by following [instructions][oidc-test-config] on their website.
|
||||
1. Download their test runner from [GitHub][oidc-github] and follow the instructions in the [README][oidc-github-readme].
|
||||
* Requires `docker` and `docker-compose`
|
||||
|
||||
Configuration is essentially the same for either type of OpenID test instance. We will proceed with option 1 in this example, and set up an [AWS EC2 instance][aws-ec2-instance] to deploy dex:
|
||||
* Create an [AWS EC2 instance][aws-ec2-quick-start] and connect to your instance using [SSH][aws-ec2-ssh].
|
||||
* Install [dex][dex-install].
|
||||
* Ensure whatever port dex is listening on (usually 5556) is open to ingress traffic in your security group configuration.
|
||||
* In this example the public DNS name, automatically assigned to each internet-facing EC2 instance, is **my-test-ec2-server.com**. You can find your instances' in the AWS EC2 management console.
|
||||
|
||||
### Configuring an OpenID test instance
|
||||
|
||||
1. Navigate to [https://op.certification.openid.net:60000][oidc-test-start].
|
||||
1. Click 'New' configuration.
|
||||
1. Input your issuer url: `http://my-test-ec2-server.com:5556/dex`.
|
||||
1. Select `code` as the response type.
|
||||
1. Click 'Create' to further configure your OpenID instance.
|
||||
1. On the next page, copy and paste the `redirect_uris` into the `redirectURIs` config field (see below).
|
||||
1. At this point we can run dex, as we have all the information necessary to create a config file (`oidc-config.yaml` in this example):
|
||||
```yaml
|
||||
issuer: http://my-test-ec2-server.com:5556/dex
|
||||
storage:
|
||||
type: sqlite3
|
||||
config:
|
||||
file: examples/dex.db
|
||||
web:
|
||||
http: 0.0.0.0:5556
|
||||
oauth2:
|
||||
skipApprovalScreen: true
|
||||
staticClients:
|
||||
- id: example-app
|
||||
redirectURIs:
|
||||
- 'https://op.certification.openid.net:${OPENID_SERVER_PORT}/authz_cb'
|
||||
name: 'Example App'
|
||||
secret: ZXhhbXBsZS1hcHAtc2VjcmV0
|
||||
connectors:
|
||||
- type: mockCallback
|
||||
id: mock
|
||||
name: Example
|
||||
```
|
||||
* Substitute `OPENID_SERVER_PORT` for your OpenID test instance port number, assigned after configuring that instance.
|
||||
* Set the `oauth2` field `skipApprovalScreen: true` to automate some clicking.
|
||||
1. Run dex:
|
||||
```bash
|
||||
$ ./bin/dex serve oidc-config.yaml
|
||||
time="2017-08-25T06:34:57Z" level=info msg="config issuer: http://my-test-ec2-server.com:5556/dex"
|
||||
...
|
||||
```
|
||||
1. Input `client_id` and `client_secret` from your config file.
|
||||
* The `id` and `secret` used here are from the example config file [`staticClients` field](../examples/config-dev.yaml#L50-L55).
|
||||
1. Use data returned by the `GET /.well-known/openid-configuration` API call to fill in the rest of the configuration forms:
|
||||
```bash
|
||||
[home@localhost ~]$ curl http://my-test-ec2-server.com:5556/dex/.well-known/openid-configuration
|
||||
{
|
||||
"issuer": "http://my-test-ec2-server.com:5556/dex",
|
||||
"authorization_endpoint": "http://my-test-ec2-server.com:5556/dex/auth",
|
||||
"token_endpoint": "http://my-test-ec2-server.com:5556/dex/token",
|
||||
"jwks_uri": "http://my-test-ec2-server.com:5556/dex/keys",
|
||||
"response_types_supported": [
|
||||
"code"
|
||||
],
|
||||
"subject_types_supported": [
|
||||
"public"
|
||||
],
|
||||
"id_token_signing_alg_values_supported": [
|
||||
"RS256"
|
||||
],
|
||||
"scopes_supported": [
|
||||
"openid",
|
||||
"email",
|
||||
"groups",
|
||||
"profile",
|
||||
"offline_access"
|
||||
],
|
||||
"token_endpoint_auth_methods_supported": [
|
||||
"client_secret_basic"
|
||||
],
|
||||
"claims_supported": [
|
||||
"aud",
|
||||
"email",
|
||||
"email_verified",
|
||||
"exp",
|
||||
"iat",
|
||||
"iss",
|
||||
"locale",
|
||||
"name",
|
||||
"sub"
|
||||
]
|
||||
}
|
||||
```
|
||||
* Fill in all configuration information that the `/.well-known/openid-configuration` endpoint returns, althgouh this is not strictly necessary. We should give the test cases as much information about dex's OP implementation as possible.
|
||||
1. Press the 'Save and Start' button to start your OpenID test instance.
|
||||
1. Follow the provided link.
|
||||
1. Run through each test case, following all instructions given by individual cases.
|
||||
* In order to pass certain cases, screenshots of OP responses might be required.
|
||||
|
||||
## Results and Submission
|
||||
|
||||
Dex does not fully pass the Basic profile test suite yet. The following table contains the current state of test results.
|
||||
|
||||
Test case ID | Result type | Cause | Relates to
|
||||
--- | --- | --- | ---
|
||||
OP-Response-Missing | Incomplete | Expected |
|
||||
OP-Response-code | Succeeded | |
|
||||
OP-Response-form_post | Succeeded | |
|
||||
OP-IDToken-C-Signature | Succeeded | |
|
||||
OP-ClientAuth-Basic-Static | Succeeded | |
|
||||
OP-ClientAuth-SecretPost-Static | Warning | Unsupported | client_secret_post
|
||||
OP-Token-refresh | Incomplete | Unsupported | userinfo_endpoint
|
||||
OP-UserInfo-Body | Incomplete | Unsupported | userinfo_endpoint
|
||||
OP-UserInfo-Endpoint | Incomplete | Unsupported | userinfo_endpoint
|
||||
OP-UserInfo-Header | Incomplete | Unsupported | userinfo_endpoint
|
||||
OP-claims-essential | Incomplete | Unsupported | userinfo_endpoint
|
||||
OP-display-page | Succeeded | |
|
||||
OP-display-popup | Succeeded | |
|
||||
OP-nonce-NoReq-code | Succeeded | |
|
||||
OP-nonce-code | Succeeded | |
|
||||
OP-prompt-login | Succeeded | |
|
||||
OP-prompt-none-LoggedIn | Succeeded | |
|
||||
OP-prompt-none-NotLoggedIn | Incomplete | Error expected
|
||||
OP-redirect_uri-NotReg | Incomplete | Requires screenshot
|
||||
OP-scope-All | Incomplete | Unsupported | address, phone
|
||||
OP-scope-address | Incomplete | Unsupported | address
|
||||
OP-scope-email | Incomplete | Unsupported | userinfo_endpoint
|
||||
OP-scope-phone | Incomplete | Unsupported | phone
|
||||
OP-scope-profile | Incomplete | Unsupported | userinfo_endpoint
|
||||
OP-Req-NotUnderstood | Succeeded | |
|
||||
OP-Req-acr_values | Warning | No acr value | id_token
|
||||
OP-Req-claims_locales | Incomplete | Unsupported | userinfo_endpoint
|
||||
OP-Req-id_token_hint | Succeeded | |
|
||||
OP-Req-login_hint | Incomplete | Missing configuration field | login_hint
|
||||
OP-Req-max_age=1 | Failed | Missing configuration field | auth_time
|
||||
OP-Req-max_age=10000 | Failed | Missing configuration field | auth_time
|
||||
OP-Req-ui_locales | Succeeded | |
|
||||
OP-OAuth-2nd | Warning | Unexpected error response | invalid_request
|
||||
OP-OAuth-2nd-30s | Warning | Unexpected error response | invalid_request
|
||||
OP-OAuth-2nd-Revokes | Incomplete | Unsupported | userinfo_endpoint
|
||||
|
||||
Once all test cases pass, submit your results by following instructions listed [on the website][oidc-result-submission].
|
||||
|
||||
[dex-install]: https://github.com/dexidp/dex/blob/master/Documentation/getting-started.md#building-the-dex-binary
|
||||
[aws-ec2-instance]: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/concepts.htmlSSH
|
||||
[aws-ec2-ssh]: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/AccessingInstancesLinux.html
|
||||
[aws-ec2-quick-start]: http://docs.aws.amazon.com/quickstarts/latest/vmlaunch/step-1-launch-instance.html
|
||||
[oidc-core-spec-mandatory]: http://openid.net/specs/openid-connect-core-1_0.html#ServerMTI
|
||||
[oidc-basic-client-spec]: http://openid.net/specs/openid-connect-basic-1_0.html
|
||||
[oidc-conf-profiles]: http://openid.net/wordpress-content/uploads/2016/12/OpenID-Connect-Conformance-Profiles.pdf
|
||||
[oidc-test-config]: http://openid.net/certification/testing/
|
||||
[oidc-test-start]: https://op.certification.openid.net:60000
|
||||
[oidc-result-submission]: http://openid.net/certification/submission/
|
||||
[oidc-cert-mark]: http://openid.net/certification/mark/
|
||||
[oidc-certified-ops]: http://openid.net/developers/certified/
|
||||
[oidc-terms-conds]: http://openid.net/wordpress-content/uploads/2015/03/OpenID-Certification-Terms-and-Conditions.pdf
|
||||
[oidc-github]: https://github.com/openid-certification/oidctest
|
||||
[oidc-github-readme]: https://github.com/openid-certification/oidctest/blob/master/README.md
|
|
@ -1 +0,0 @@
|
|||
This document has moved to [connectors/oidc.md](connectors/oidc.md).
|
|
@ -1,141 +0,0 @@
|
|||
# An overview of OpenID Connect
|
||||
|
||||
This document attempts to provide a general overview of the [OpenID Connect protocol](https://openid.net/connect/), a flavor of OAuth2 that dex implements. While this document isn't complete, we hope it provides enough information to get users up and running.
|
||||
|
||||
For an overview of custom claims, scopes, and client features implemented by dex, see [this document][scopes-claims-clients].
|
||||
|
||||
## OAuth2
|
||||
|
||||
OAuth2 should be familiar to anyone who's used something similar to a "Login
|
||||
with Facebook" button. In these cases an application has chosen to let an
|
||||
outside provider, in this case Facebook, attest to your identity instead of
|
||||
having you set a username and password with the app itself.
|
||||
|
||||
The general flow for server side apps is:
|
||||
|
||||
1. A new user visits an application.
|
||||
1. The application redirects the user to Facebook.
|
||||
1. The user logs into Facebook, then is asked if it's okay to let the
|
||||
application view the user's profile, post on their behalf, etc.
|
||||
1. If the user clicks okay, Facebook redirects the user back to the application
|
||||
with a code.
|
||||
1. The application redeems that code with provider for a token that can be used
|
||||
to access the authorized actions, such as viewing a users profile or posting on
|
||||
their wall.
|
||||
|
||||
In these cases, dex is acting as Facebook (called the "provider" in OpenID
|
||||
Connect) while clients apps redirect to it for the end user's identity.
|
||||
|
||||
## ID Tokens
|
||||
|
||||
Unfortunately the access token applications get from OAuth2 providers is
|
||||
completely opaque to the client and unique to the provider. The token you
|
||||
receive from Facebook will be completely different from the one you'd get from
|
||||
Twitter or GitHub.
|
||||
|
||||
OpenID Connect's primary extension of OAuth2 is an additional token returned in
|
||||
the token response called the ID Token. This token is a [JSON Web Token](
|
||||
https://tools.ietf.org/html/rfc7519) signed by the OpenID Connect server, with
|
||||
well known fields for user ID, name, email, etc. A typical token response from
|
||||
an OpenID Connect looks like (with less whitespace):
|
||||
|
||||
```
|
||||
HTTP/1.1 200 OK
|
||||
Content-Type: application/json
|
||||
Cache-Control: no-store
|
||||
Pragma: no-cache
|
||||
|
||||
{
|
||||
"access_token": "SlAV32hkKG",
|
||||
"token_type": "Bearer",
|
||||
"refresh_token": "8xLOxBtZp8",
|
||||
"expires_in": 3600,
|
||||
"id_token": "eyJhbGciOiJSUzI1NiIsImtpZCI6IjFlOWdkazcifQ.ewogImlzc
|
||||
yI6ICJodHRwOi8vc2VydmVyLmV4YW1wbGUuY29tIiwKICJzdWIiOiAiMjQ4Mjg5
|
||||
NzYxMDAxIiwKICJhdWQiOiAiczZCaGRSa3F0MyIsCiAibm9uY2UiOiAibi0wUzZ
|
||||
fV3pBMk1qIiwKICJleHAiOiAxMzExMjgxOTcwLAogImlhdCI6IDEzMTEyODA5Nz
|
||||
AKfQ.ggW8hZ1EuVLuxNuuIJKX_V8a_OMXzR0EHR9R6jgdqrOOF4daGU96Sr_P6q
|
||||
Jp6IcmD3HP99Obi1PRs-cwh3LO-p146waJ8IhehcwL7F09JdijmBqkvPeB2T9CJ
|
||||
NqeGpe-gccMg4vfKjkM8FcGvnzZUN4_KSP0aAp1tOJ1zZwgjxqGByKHiOtX7Tpd
|
||||
QyHE5lcMiKPXfEIQILVq0pc_E2DzL7emopWoaoZTF_m0_N0YzFC6g6EJbOEoRoS
|
||||
K5hoDalrcvRYLSrQAZZKflyuVCyixEoV9GfNQC3_osjzw2PAithfubEEBLuVVk4
|
||||
XUVrWOLrLl0nx7RkKU8NXNHq-rvKMzqg"
|
||||
}
|
||||
```
|
||||
|
||||
That ID Token is a JWT with three base64'd fields separated by dots. The first
|
||||
is a header, the second is a payload, and the third is a signature of the first
|
||||
two fields. When parsed we can see the payload of this value is.
|
||||
|
||||
```
|
||||
{
|
||||
"iss": "http://server.example.com",
|
||||
"sub": "248289761001",
|
||||
"aud": "s6BhdRkqt3",
|
||||
"nonce": "n-0S6_WzA2Mj",
|
||||
"exp": 1311281970,
|
||||
"iat": 1311280970
|
||||
}
|
||||
```
|
||||
|
||||
This has a few interesting fields such as
|
||||
|
||||
* The server that issued this token (`iss`).
|
||||
* The token's subject (`sub`). In this case a unique ID of the end user.
|
||||
* The token's audience (`aud`). The ID of the OAuth2 client this was issued for.
|
||||
|
||||
TODO: Add examples of payloads with "email" fields.
|
||||
|
||||
## Discovery
|
||||
|
||||
OpenID Connect servers have a discovery mechanism for OAuth2 endpoints, scopes
|
||||
supported, and indications of various other OpenID Connect features.
|
||||
|
||||
```
|
||||
$ curl http://127.0.0.1:5556/dex/.well-known/openid-configuration
|
||||
{
|
||||
"issuer": "http://127.0.0.1:5556",
|
||||
"authorization_endpoint": "http://127.0.0.1:5556/auth",
|
||||
"token_endpoint": "http://127.0.0.1:5556/token",
|
||||
"jwks_uri": "http://127.0.0.1:5556/keys",
|
||||
"response_types_supported": [
|
||||
"code"
|
||||
],
|
||||
"subject_types_supported": [
|
||||
"public"
|
||||
],
|
||||
"id_token_signing_alg_values_supported": [
|
||||
"RS256"
|
||||
],
|
||||
"scopes_supported": [
|
||||
"openid",
|
||||
"email",
|
||||
"profile"
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
Importantly, we've discovered the authorization endpoint, token endpoint, and
|
||||
the location of the server's public keys. OAuth2 clients should be able to use
|
||||
the token and auth endpoints immediately, while a JOSE library can be used to
|
||||
parse the keys. The keys endpoint returns a [JSON Web Key](
|
||||
https://tools.ietf.org/html/rfc7517) Set of public keys that will look
|
||||
something like this:
|
||||
|
||||
```
|
||||
$ curl http://127.0.0.1:5556/dex/keys
|
||||
{
|
||||
"keys": [
|
||||
{
|
||||
"use": "sig",
|
||||
"kty": "RSA",
|
||||
"kid": "5d19a0fde5547960f4edaa1e1e8293e5534169ba",
|
||||
"alg": "RS256",
|
||||
"n": "5TAXCxkAQqHEqO0InP81z5F59PUzCe5ZNaDsD1SXzFe54BtXKn_V2a3K-BUNVliqMKhC2LByWLuI-A5ZlA5kXkbRFT05G0rusiM0rbkN2uvRmRCia4QlywE02xJKzeZV3KH6PldYqV_Jd06q1NV3WNqtcHN6MhnwRBfvkEIm7qWdPZ_mVK7vayfEnOCFRa7EZqr-U_X84T0-50wWkHTa0AfnyVvSMK1eKL-4yc26OWkmjh5ALfQFtnsz30Y2TOJdXtEfn35Y_882dNBDYBxtJV4PaSjXCxhiaIuBHp5uRS1INyMXCx2ve22ASNx_ERorv6BlXQoMDqaML2bSiN9N8Q",
|
||||
"e": "AQAB"
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
[scopes-claims-clients]: custom-scopes-claims-clients.md
|
|
@ -1,82 +0,0 @@
|
|||
# Proposal: design for revoking refresh tokens.
|
||||
|
||||
Refresh tokens are issued to the client by the authorization server and are used
|
||||
to request a new access token when the current access token becomes invalid or expires.
|
||||
It is a common usecase for the end users to revoke client access to their identity.
|
||||
This proposal defines the changes needed in Dex v2 to support refresh token revocation.
|
||||
|
||||
## Motivation
|
||||
|
||||
1. Currently refresh tokens are not associated with the user. Need a new "session object" for this.
|
||||
2. Need an API to list refresh tokens based on the UserID.
|
||||
3. We need a way for users to login to dex and revoke a client.
|
||||
4. Limit the number refresh tokens for each user-client pair to 1.
|
||||
|
||||
## Details
|
||||
|
||||
Currently in Dex when an end user successfully logs in via a connector and has the OfflineAccess
|
||||
scope set to true, a refresh token is created and stored in the backing datastore. There is no
|
||||
association between the end user and the refresh token. Hence if we want to support the functionality
|
||||
of users being able to revoke refresh tokens, the first step is to have a structure in place that allows
|
||||
us retrieve a list of refresh tokens depending on the authenticated user.
|
||||
|
||||
```go
|
||||
// Reference object for RefreshToken containing only metadata.
|
||||
type RefreshTokenRef struct {
|
||||
// ID of the RefreshToken
|
||||
ID string
|
||||
CreatedAt time.Time
|
||||
LastUsed time.Time
|
||||
}
|
||||
|
||||
// Session objects pertaining to users with refresh tokens.
|
||||
//
|
||||
// Will have to handle garbage collection i.e. if no refresh token exists for a user,
|
||||
// this object must be cleaned up.
|
||||
type OfflineSession struct {
|
||||
// UserID of an end user who has logged in to the server.
|
||||
UserID string
|
||||
// The ID of the connector used to login the user.
|
||||
ConnID string
|
||||
// List of pointers to RefreshTokens issued for SessionID
|
||||
Refresh []*RefreshTokenRef
|
||||
}
|
||||
|
||||
// Retrieve OfflineSession obj for given userId and connID
|
||||
func getOfflineSession (userId string, connID string)
|
||||
|
||||
```
|
||||
|
||||
### Changes in Dex CodeFlows
|
||||
|
||||
1. Client requests a refresh token:
|
||||
Try to retrieve the `OfflineSession` object for the User with the given `UserID + ConnID`.
|
||||
This leads to two possibilities:
|
||||
* Object exists: This means a Refresh token already exists for the user.
|
||||
Update the existing `OffilineSession` object with the newly received token as follows:
|
||||
* CreateRefresh() will create a new `RefreshToken` obj in the storage.
|
||||
* Update the `Refresh` list with the new `RefreshToken` pointer.
|
||||
* Delete the old refresh token in storage.
|
||||
|
||||
* No object found: This implies that this will be the first refresh token for the user.
|
||||
* CreateRefresh() will create a new `RefreshToken` obj in the storage.
|
||||
* Create an OfflineSession for the user and add the new `RefreshToken` pointer to
|
||||
the `Refresh` list.
|
||||
|
||||
2. Refresh token rotation:
|
||||
There will be no change to this codeflow. When the client refreshes a refresh token, the `TokenID`
|
||||
still remains intact and only the `RefreshToken` obj gets updated with a new nonce. We do not need
|
||||
any additional checks in the OfflineSession objects as the `RefreshToken` pointers still remain intact.
|
||||
|
||||
3. User revokes a refresh token (New functionality):
|
||||
A user that has been authenticated externally will have the ability to revoke their refresh tokens.
|
||||
Please note that Dex's API does not perform the authentication, this will have to be done by an
|
||||
external app.
|
||||
Steps involved:
|
||||
* Get `OfflineSession` obj with given UserID + ConnID.
|
||||
* If a refresh token exists in `Refresh`, delete the `RefreshToken` (handle this in storage)
|
||||
and its pointer value in `Refresh`. Clean up the OfflineSession object.
|
||||
* If there is no refresh token found, handle error case.
|
||||
|
||||
NOTE: To avoid race conditions between “requesting a refresh token” and “revoking a refresh token”, use
|
||||
locking mechanism when updating an `OfflineSession` object.
|
|
@ -1,165 +0,0 @@
|
|||
# Proposal: upstream refreshing
|
||||
|
||||
## TL;DR
|
||||
|
||||
Today, if a user deletes their GitHub account, dex will keep allowing clients to
|
||||
refresh tokens on that user's behalf because dex never checks back in with
|
||||
GitHub.
|
||||
|
||||
This is a proposal to change the connector package so the dex can check back
|
||||
in with GitHub.
|
||||
|
||||
## The problem
|
||||
|
||||
When dex is federating to an upstream identity provider (IDP), we want to ensure
|
||||
claims being passed onto clients remain fresh. This includes data such as Google
|
||||
accounts display names, LDAP group membership, account deactivations. Changes to
|
||||
these on an upstream IDP should always be reflected in the claims dex passes to
|
||||
its own clients.
|
||||
|
||||
Refresh tokens make this complicated. When refreshing a token, unlike normal
|
||||
logins, dex doesn't have the opportunity to prompt for user interaction. For
|
||||
example, if dex is proxying to a LDAP server, it won't have the user's username
|
||||
and passwords.
|
||||
|
||||
Dex can't do this today because connectors have no concept of checking back in
|
||||
with an upstream provider (with the sole exception of groups). They're only
|
||||
called during the initial login, and never consulted when dex needs to mint a
|
||||
new refresh token for a client. Additionally, connectors aren't actually aware
|
||||
of the scopes being requested by the client, so they don't know when they should
|
||||
setup the ability to check back in and have to treat every request identically.
|
||||
|
||||
## Changes to the connector package
|
||||
|
||||
The biggest changes proposed impact the connector package and connector
|
||||
implementations.
|
||||
|
||||
1. Connectors should be consulted when dex attempts to refresh a token.
|
||||
2. Connectors should be aware of the scopes requested by the client.
|
||||
|
||||
The second bullet is important because of the first. If a client isn't
|
||||
requesting a refresh token, the connector shouldn't do the extra work, such as
|
||||
requesting additional upstream scopes.
|
||||
|
||||
to address the first point, a top level `Scopes` object will be added to the
|
||||
connector package to express the scopes requested by the client. The
|
||||
`CallbackConnector` and `PasswordConnector` will be updated accordingly.
|
||||
|
||||
```go
|
||||
// Scopes represents additional data requested by the clients about the end user.
|
||||
type Scopes struct{
|
||||
// The client has requested a refresh token from the server.
|
||||
OfflineAccess bool
|
||||
|
||||
// The client has requested group information about the end user.
|
||||
Groups bool
|
||||
}
|
||||
|
||||
// CallbackConnector is an interface implemented by connectors which use an OAuth
|
||||
// style redirect flow to determine user information.
|
||||
type CallbackConnector interface {
|
||||
// The initial URL to redirect the user to.
|
||||
//
|
||||
// OAuth2 implementations should request different scopes from the upstream
|
||||
// identity provider based on the scopes requested by the downstream client.
|
||||
// For example, if the downstream client requests a refresh token from the
|
||||
// server, the connector should also request a token from the provider.
|
||||
LoginURL(s Scopes, callbackURL, state string) (string, error)
|
||||
|
||||
// Handle the callback to the server and return an identity.
|
||||
HandleCallback(s Scopes, r *http.Request) (identity Identity, state string, err error)
|
||||
}
|
||||
|
||||
// PasswordConnector is an interface implemented by connectors which take a
|
||||
// username and password.
|
||||
type PasswordConnector interface {
|
||||
Login(s Scopes, username, password string) (identity Identity, validPassword bool, err error)
|
||||
}
|
||||
```
|
||||
|
||||
The existing `GroupsConnector` plays two roles.
|
||||
|
||||
1. The connector only attempts to grab groups when the downstream client requests it.
|
||||
2. Allow group information to be refreshed.
|
||||
|
||||
The first issue is remedied by the added `Scopes` struct. This proposal also
|
||||
hopes to generalize the need of the second role by adding a more general
|
||||
`RefreshConnector`:
|
||||
|
||||
```go
|
||||
type Identity struct {
|
||||
// Existing fields...
|
||||
|
||||
// Groups are added to the identity object, since connectors are now told
|
||||
// if they're being requested.
|
||||
|
||||
// The set of groups a user is a member of.
|
||||
Groups []string
|
||||
}
|
||||
|
||||
|
||||
// RefreshConnector is a connector that can update the client claims.
|
||||
type RefreshConnector interface {
|
||||
// Refresh is called when a client attempts to claim a refresh token. The
|
||||
// connector should attempt to update the identity object to reflect any
|
||||
// changes since the token was last refreshed.
|
||||
Refresh(s Scopes, identity Identity) (Identity, error)
|
||||
|
||||
// TODO(ericchiang): Should we allow connectors to indicate that the user has
|
||||
// been delete or an upstream token has been revoked? This would allow us to
|
||||
// know when we should remove the downstream refresh token, and when there was
|
||||
// just a server error, but might be hard to determine for certain protocols.
|
||||
// Might be safer to always delete the downstream token if the Refresh()
|
||||
// method returns an error.
|
||||
}
|
||||
```
|
||||
|
||||
## Example changes to the "passwordDB" connector
|
||||
|
||||
The `passwordDB` connector is the internal connector maintained by the server.
|
||||
As an example, these are the changes to that connector if this change was
|
||||
accepted.
|
||||
|
||||
```go
|
||||
func (db passwordDB) Login(s connector.Scopes, username, password string) (connector.Identity, bool, error) {
|
||||
// No change to existing implementation. Scopes can be ignored since we'll
|
||||
// always have access to the password objects.
|
||||
|
||||
}
|
||||
|
||||
func (db passwordDB) Refresh(s connector.Scopes, identity connector.Identity) (connector.Identity, error) {
|
||||
// If the user has been deleted, the refresh token will be rejected.
|
||||
p, err := db.s.GetPassword(identity.Email)
|
||||
if err != nil {
|
||||
if err == storage.ErrNotFound {
|
||||
return connector.Identity{}, errors.New("user not found")
|
||||
}
|
||||
return connector.Identity{}, fmt.Errorf("get password: %v", err)
|
||||
}
|
||||
|
||||
// User removed but a new user with the same email exists.
|
||||
if p.UserID != identity.UserID {
|
||||
return connector.Identity{}, errors.New("user not found")
|
||||
}
|
||||
|
||||
// If a user has updated their username, that will be reflected in the
|
||||
// refreshed token.
|
||||
identity.Username = p.Username
|
||||
return identity, nil
|
||||
}
|
||||
```
|
||||
|
||||
## Caveats
|
||||
|
||||
Certain providers, such as Google, will only grant a single refresh token for each
|
||||
client + end user pair. The second time one's requested, no refresh token is
|
||||
returned. This means refresh tokens must be stored by dex as objects on an
|
||||
upstream identity rather than part of a downstream refresh even.
|
||||
|
||||
Right now `ConnectorData` is too general for this since it is only stored with a
|
||||
refresh token and can't be shared between sessions. This should be rethought in
|
||||
combination with the [`user-object.md`](./user-object.md) proposal to see if
|
||||
there are reasonable ways for us to do this.
|
||||
|
||||
This isn't a problem for providers like GitHub because they return the same
|
||||
refresh token every time. We don't need to track a token per client.
|
|
@ -1,146 +0,0 @@
|
|||
# Proposal: user objects for revoking refresh tokens and merging accounts
|
||||
|
||||
Certain operations require tracking users the have logged in through the server
|
||||
and storing them in the backend. Namely, allowing end users to revoke refresh
|
||||
tokens and merging existing accounts with upstream providers.
|
||||
|
||||
While revoking refresh tokens is relatively easy, merging accounts is a
|
||||
difficult problem. What if display names or emails are different? What happens
|
||||
to a user with two remote identities with the same upstream service? Should
|
||||
this be presented differently for a user with remote identities for different
|
||||
upstream services? This proposal only covers a minimal merging implementation
|
||||
by guaranteeing that merged accounts will always be presented to clients with
|
||||
the same user ID.
|
||||
|
||||
This proposal defines the following objects and methods to be added to the
|
||||
storage package to allow user information to be persisted.
|
||||
|
||||
```go
|
||||
// User is an end user which has logged in to the server.
|
||||
//
|
||||
// Users do not hold additional data, such as emails, because claim information
|
||||
// is always supplied by an upstream provider during the auth flow. The ID is
|
||||
// the only information from this object which overrides the claims produced by
|
||||
// connectors.
|
||||
//
|
||||
// Clients which wish to associate additional data with a user must do so on
|
||||
// their own. The server only guarantees that IDs will be constant for an end
|
||||
// user, no matter what backend they use to login.
|
||||
type User struct {
|
||||
// A string which uniquely identifies the user for the server. This overrides
|
||||
// the ID provided by the connector in the ID Token claims.
|
||||
ID string
|
||||
|
||||
// A list of clients who have been issued refresh tokens for this user.
|
||||
//
|
||||
// When a refresh token is redeemed, the server will check this field to
|
||||
// ensure that the client is still on this list. To revoke a client,
|
||||
// remove it from here.
|
||||
AuthorizedClients []AuthorizedClient
|
||||
|
||||
// A set of remote identities which are able to login as this user.
|
||||
RemoteIdentities []RemoteIdentity
|
||||
}
|
||||
|
||||
// AuthorizedClient is a client that has a refresh token out for this user.
|
||||
type AuthorizedClient struct {
|
||||
// The ID of the client.
|
||||
ClientID string
|
||||
// The last time a token was refreshed.
|
||||
LastRefreshed time.Time
|
||||
}
|
||||
|
||||
// RemoteIdentity is the smallest amount of information that identifies a user
|
||||
// with a remote service. It indicates which remote identities should be able
|
||||
// to login as a specific user.
|
||||
//
|
||||
// RemoteIdentity contains an username so an end user can be displayed this
|
||||
// object and reason about what upstream profile it represents. It is not used
|
||||
// to cache claims, such as groups or emails, because these are always provided
|
||||
// by the upstream identity system during login.
|
||||
type RemoteIdentity struct {
|
||||
// The ID of the connector used to login the user.
|
||||
ConnectorID string
|
||||
// A string which uniquely identifies the user with the remote system.
|
||||
ConnectorUserID stirng
|
||||
|
||||
// Optional, human readable name for this remote identity. Only used when
|
||||
// displaying the remote identity to the end user (e.g. when merging
|
||||
// accounts). NOT used for determining ID Token claims.
|
||||
Username string
|
||||
}
|
||||
```
|
||||
|
||||
`UserID` fields will be added to the `AuthRequest`, `AuthCode` and `RefreshToken`
|
||||
structs. When a user logs in successfully through a connector
|
||||
[here](https://github.com/dexidp/dex/blob/95a61454b522edd6643ced36b9d4b9baa8059556/server/handlers.go#L227),
|
||||
the server will attempt to either get the user, or create one if none exists with
|
||||
the remote identity.
|
||||
|
||||
`AuthorizedClients` serves two roles. First is makes displaying the set of
|
||||
clients a user is logged into easy. Second, because we don't assume multi-object
|
||||
transactions, we can't ensure deleting all refresh tokens a client has for a
|
||||
user. Between listing the set of refresh tokens and deleting a token, a client
|
||||
may have already redeemed the token and created a new one.
|
||||
|
||||
When an OAuth2 client exchanges a code for a token, the following steps are
|
||||
taken to populate the `AuthorizedClients`:
|
||||
|
||||
1. Get token where the user has authorized the `offline_access` scope.
|
||||
1. Update the user checking authorized clients. If client is not in the list,
|
||||
add it.
|
||||
1. Create a refresh token and return the token.
|
||||
|
||||
When a OAuth2 client attempts to renew a refresh token, the server ensures that
|
||||
the token hasn't been revoked.
|
||||
|
||||
1. Check authorized clients and update the `LastRefreshed` timestamp. If client
|
||||
isn't in list error out and delete the refresh token.
|
||||
1. Continue renewing the refresh token.
|
||||
|
||||
When the end user revokes a client, the following steps are used to.
|
||||
|
||||
1. Update the authorized clients by removing the client from the list. This
|
||||
atomic action causes any renew attempts to fail.
|
||||
1. Iterate through list of refresh tokens and garbage collect any tokens issued
|
||||
by the user for the client. This isn't atomic, but exists so a user can
|
||||
re-authorize a client at a later time without authorizing old refresh tokens.
|
||||
|
||||
This is clunky due to the lack of multi-object transactions. E.g. we can't delete
|
||||
all the refresh tokens at once because we don't have that guarantee.
|
||||
|
||||
Merging accounts becomes extremely simple. Just add another remote identity to
|
||||
the user object.
|
||||
|
||||
We hope to provide a web interface that a user can login to to perform these
|
||||
actions. Perhaps using a well known client issued exclusively for the server.
|
||||
|
||||
The new `User` object requires adding the following methods to the storage
|
||||
interface, and (as a nice side effect) deleting the `ListRefreshTokens()` method.
|
||||
|
||||
```go
|
||||
type Storage interface {
|
||||
// ...
|
||||
|
||||
CreateUser(u User) error
|
||||
|
||||
DeleteUser(id string) error
|
||||
|
||||
GetUser(id string) error
|
||||
GetUserByRemoteIdentity(connectorID, connectorUserID string) (User, error)
|
||||
|
||||
// Updates are assumed to be atomic.
|
||||
//
|
||||
// When a UpdateUser is called, if clients are removed from the
|
||||
// AuthorizedClients list, the underlying storage SHOULD clean up refresh
|
||||
// tokens issued for the removed clients. This allows backends with
|
||||
// multi-transactional capabilities to utilize them, while key-value stores
|
||||
// only guarantee best effort.
|
||||
UpdateUser(id string, updater func(old User) (User, error)) error
|
||||
}
|
||||
```
|
||||
|
||||
Importantly, this will be the first object which has a secondary index.
|
||||
The Kubernetes client will simply list all the users in memory then iterate over
|
||||
them to support this (possibly followed by a "watch" based optimization). SQL
|
||||
implementations will have an easier time.
|
|
@ -1 +0,0 @@
|
|||
This document has moved to [connectors/saml.md](connectors/saml.md).
|
|
@ -1,242 +0,0 @@
|
|||
# Storage options
|
||||
|
||||
Dex requires persisting state to perform various tasks such as track refresh tokens, preventing replays, and rotating keys. This document is a summary of the storage configurations supported by dex.
|
||||
|
||||
Storage breaches are serious as they can affect applications that rely on dex. Dex saves sensitive data in its backing storage, including signing keys and bcrypt'd passwords. As such, transport security and database ACLs should both be used, no matter which storage option is chosen.
|
||||
|
||||
## Etcd
|
||||
|
||||
Dex supports persisting state to [etcd v3](https://github.com/coreos/etcd).
|
||||
|
||||
An example etcd configuration is using these values:
|
||||
|
||||
```
|
||||
storage:
|
||||
type: etcd
|
||||
config:
|
||||
# list of etcd endpoints we should connect to
|
||||
endpoints:
|
||||
- http://localhost:2379
|
||||
namespace: my-etcd-namespace/
|
||||
```
|
||||
|
||||
Etcd storage can be customized further using the following options:
|
||||
|
||||
* `endpoints`: list of etcd endpoints we should connect to
|
||||
* `namespace`: etcd namespace to be set for the connection. All keys created by
|
||||
etcd storage will be prefixed with the namespace. This is useful when you
|
||||
share your etcd cluster amongst several applications. Another approach for
|
||||
setting namespace is to use [etcd proxy](https://coreos.com/etcd/docs/latest/op-guide/grpc_proxy.html#namespacing)
|
||||
* `username`: username for etcd authentication
|
||||
* `password`: password for etcd authentication
|
||||
* `ssl`: ssl setup for etcd connection
|
||||
* `serverName`: ensures that the certificate matches the given hostname the
|
||||
client is connecting to.
|
||||
* `caFile`: path to the ca
|
||||
* `keyFile`: path to the private key
|
||||
* `certFile`: path to the certificate
|
||||
|
||||
## Kubernetes custom resource definitions (CRDs)
|
||||
|
||||
Kubernetes [custom resource definitions](crd) are a way for applications to create new resources types in the Kubernetes API.
|
||||
|
||||
The Custom Resource Definition (CRD) API object was introduced in Kubernetes version 1.7 to replace the Third Party Resource (TPR) extension. CRDs allow dex to run on top of an existing Kubernetes cluster without the need for an external database. While this storage may not be appropriate for a large number of users, it's extremely effective for many Kubernetes use cases.
|
||||
|
||||
The rest of this section will explore internal details of how dex uses CRDs. __Admins should not interact with these resources directly__, except while debugging. These resources are only designed to store state and aren't meant to be consumed by end users. For modifying dex's state dynamically see the [API documentation](api.md).
|
||||
|
||||
The following is an example of the AuthCode resource managed by dex:
|
||||
|
||||
```
|
||||
apiVersion: apiextensions.k8s.io/v1beta1
|
||||
kind: CustomResourceDefinition
|
||||
metadata:
|
||||
creationTimestamp: 2017-09-13T19:56:28Z
|
||||
name: authcodes.dex.coreos.com
|
||||
resourceVersion: "288893"
|
||||
selfLink: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/authcodes.dex.coreos.com
|
||||
uid: a1cb72dc-98bd-11e7-8f6a-02d13336a01e
|
||||
spec:
|
||||
group: dex.coreos.com
|
||||
names:
|
||||
kind: AuthCode
|
||||
listKind: AuthCodeList
|
||||
plural: authcodes
|
||||
singular: authcode
|
||||
scope: Namespaced
|
||||
version: v1
|
||||
status:
|
||||
acceptedNames:
|
||||
kind: AuthCode
|
||||
listKind: AuthCodeList
|
||||
plural: authcodes
|
||||
singular: authcode
|
||||
conditions:
|
||||
- lastTransitionTime: null
|
||||
message: no conflicts found
|
||||
reason: NoConflicts
|
||||
status: "True"
|
||||
type: NamesAccepted
|
||||
- lastTransitionTime: 2017-09-13T19:56:28Z
|
||||
message: the initial names have been accepted
|
||||
reason: InitialNamesAccepted
|
||||
status: "True"
|
||||
type: Established
|
||||
```
|
||||
|
||||
Once the `CustomResourceDefinition` is created, custom resources can be created and stored at a namespace level. The CRD type and the custom resources can be queried, deleted, and edited like any other resource using `kubectl`.
|
||||
|
||||
dex requires access to the non-namespaced `CustomResourceDefinition` type. For example, clusters using RBAC authorization would need to create the following roles and bindings:
|
||||
```
|
||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
name: dex
|
||||
rules:
|
||||
- apiGroups: ["dex.coreos.com"] # API group created by dex
|
||||
resources: ["*"]
|
||||
verbs: ["*"]
|
||||
- apiGroups: ["apiextensions.k8s.io"]
|
||||
resources: ["customresourcedefinitions"]
|
||||
verbs: ["create"] # To manage its own resources identity must be able to create customresourcedefinitions.
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: dex
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: dex
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: dex # Service account assigned to the dex pod.
|
||||
namespace: dex-namespace # The namespace dex is running in.
|
||||
|
||||
```
|
||||
|
||||
|
||||
### Removed: Kubernetes third party resources(TPRs)
|
||||
|
||||
TPR support in dex has been removed. The last version to support TPR
|
||||
is [v2.17.0](https://github.com/dexidp/dex/tree/v2.17.0)
|
||||
|
||||
If you are currently running dex using TPRs, you will need to [migrate to CRDs](https://github.com/dexidp/dex/blob/v2.17.0/Documentation/storage.md#migrating-from-tprs-to-crds) before you upgrade to a post v2.17 dex. The script mentioned in the instructions can be [found here](https://github.com/dexidp/dex/blob/v2.17.0/scripts/dump-tprs)
|
||||
|
||||
### Configuration
|
||||
|
||||
The storage configuration is extremely limited since installations running outside a Kubernetes cluster would likely prefer a different storage option. An example configuration for dex running inside Kubernetes:
|
||||
|
||||
```
|
||||
storage:
|
||||
type: kubernetes
|
||||
config:
|
||||
inCluster: true
|
||||
```
|
||||
|
||||
Dex determines the namespace it's running in by parsing the service account token automatically mounted into its pod.
|
||||
|
||||
## SQL
|
||||
|
||||
Dex supports three flavors of SQL: SQLite3, Postgres and MySQL.
|
||||
|
||||
Migrations are performed automatically on the first connection to the SQL server (it does not support rolling back). Because of this dex requires privileges to add and alter the tables for its database.
|
||||
|
||||
__NOTE:__ Previous versions of dex required symmetric keys to encrypt certain values before sending them to the database. This feature has not yet been ported to dex v2. If it is added later there may not be a migration path for current v2 users.
|
||||
|
||||
### SQLite3
|
||||
|
||||
SQLite3 is the recommended storage for users who want to stand up dex quickly. It is __not__ appropriate for real workloads.
|
||||
|
||||
The SQLite3 configuration takes a single argument, the database file.
|
||||
|
||||
```
|
||||
storage:
|
||||
type: sqlite3
|
||||
config:
|
||||
file: /var/dex/dex.db
|
||||
```
|
||||
|
||||
Because SQLite3 uses file locks to prevent race conditions, if the ":memory:" value is provided dex will automatically disable support for concurrent database queries.
|
||||
|
||||
### Postgres
|
||||
|
||||
When using Postgres, admins may want to dedicate a database to dex for the following reasons:
|
||||
|
||||
1. Dex requires privileged access to its database because it performs migrations.
|
||||
2. Dex's database table names are not configurable; when shared with other applications there may be table name clashes.
|
||||
|
||||
```
|
||||
CREATE DATABASE dex_db;
|
||||
CREATE USER dex WITH PASSWORD '66964843358242dbaaa7778d8477c288';
|
||||
GRANT ALL PRIVILEGES ON DATABASE dex_db TO dex;
|
||||
```
|
||||
|
||||
An example config for Postgres setup using these values:
|
||||
|
||||
```
|
||||
storage:
|
||||
type: postgres
|
||||
config:
|
||||
database: dex_db
|
||||
user: dex
|
||||
password: 66964843358242dbaaa7778d8477c288
|
||||
ssl:
|
||||
mode: verify-ca
|
||||
caFile: /etc/dex/postgres.ca
|
||||
```
|
||||
|
||||
The SSL "mode" corresponds to the `github.com/lib/pq` package [connection options][psql-conn-options]. If unspecified, dex defaults to the strictest mode "verify-full".
|
||||
|
||||
### MySQL
|
||||
|
||||
Dex requires MySQL 5.7 or later version. When using MySQL, admins may want to dedicate a database to dex for the following reasons:
|
||||
|
||||
1. Dex requires privileged access to its database because it performs migrations.
|
||||
2. Dex's database table names are not configurable; when shared with other applications there may be table name clashes.
|
||||
|
||||
```
|
||||
CREATE DATABASE dex_db;
|
||||
CREATE USER dex IDENTIFIED BY '66964843358242dbaaa7778d8477c288';
|
||||
GRANT ALL PRIVILEGES ON dex_db.* TO dex;
|
||||
```
|
||||
|
||||
An example config for MySQL setup using these values:
|
||||
|
||||
```
|
||||
storage:
|
||||
type: mysql
|
||||
config:
|
||||
database: dex_db
|
||||
user: dex
|
||||
password: 66964843358242dbaaa7778d8477c288
|
||||
ssl:
|
||||
mode: custom
|
||||
caFile: /etc/dex/mysql.ca
|
||||
```
|
||||
|
||||
The SSL "mode" corresponds to the `github.com/go-sql-driver/mysql` package [connection options][mysql-conn-options]. If unspecified, dex defaults to the strictest mode "true".
|
||||
|
||||
## Adding a new storage options
|
||||
|
||||
Each storage implementation bears a large ongoing maintenance cost and needs to be updated every time a feature requires storing a new type. Bugs often require in depth knowledge of the backing software, and much of this work will be done by developers who are not the original author. Changes to dex which add new storage implementations require a strong use case to be considered for inclusion.
|
||||
|
||||
### New storage option references
|
||||
|
||||
Those who still want to construct a proposal for a new storage should review the following packages:
|
||||
|
||||
* `github.com/dexidp/dex/storage`: Interface definitions which the storage must implement. __NOTE:__ This package is not stable.
|
||||
* `github.com/dexidp/dex/storage/conformance`: Conformance tests which storage implementations must pass.
|
||||
|
||||
### New storage option requirements
|
||||
|
||||
Any proposal to add a new implementation must address the following:
|
||||
|
||||
* Integration testing setups (Travis and developer workstations).
|
||||
* Transactional requirements: atomic deletes, updates, etc.
|
||||
* Is there an established and reasonable Go client?
|
||||
|
||||
[issues-transaction-tests]: https://github.com/dexidp/dex/issues/600
|
||||
[k8s-api]: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/api-conventions.md#concurrency-control-and-consistency
|
||||
[psql-conn-options]: https://godoc.org/github.com/lib/pq#hdr-Connection_String_Parameters
|
||||
[mysql-conn-options]: https://github.com/go-sql-driver/mysql#tls
|
||||
[crd]: https://kubernetes.io/docs/tasks/access-kubernetes-api/extend-api-custom-resource-definitions/
|
|
@ -1,26 +0,0 @@
|
|||
# Templates
|
||||
|
||||
## Using your own templates
|
||||
|
||||
Dex supports using your own templates and passing arbitrary data to them to help customize your installation.
|
||||
|
||||
Steps:
|
||||
|
||||
1. Copy contents of the `web` directory over to a new directory.
|
||||
2. Customize the templates as needed, be sure to retain all the existing variables so Dex continues working correctly.
|
||||
a. Use this syntax `{{ "your_key" | extra }}` to use values from `frontend.extra`.
|
||||
3. Write a theme for your templates in the `themes` directory.
|
||||
4. Add your custom data to the Dex configuration `frontend.extra`.
|
||||
```yaml
|
||||
frontend:
|
||||
dir: /path/to/custom/web
|
||||
issuer: my-dex
|
||||
extra:
|
||||
tos_footer_link: "https://example.com/terms"
|
||||
client_logo_url: "../theme/client-logo.png"
|
||||
foo: "bar"
|
||||
```
|
||||
5. Set the `frontend.dir` value to your own `web` directory.
|
||||
6. Write the issuer in the `issuer` directory in order to modify the Dex title and the `Log in to <<dex>>` tag.
|
||||
|
||||
To test your templates simply run Dex with a valid configuration and go through a login flow.
|
|
@ -1,191 +0,0 @@
|
|||
# Writing apps that use dex
|
||||
|
||||
Once you have dex up and running, the next step is to write applications that use dex to drive authentication. Apps that interact with dex generally fall into one of two categories:
|
||||
|
||||
1. Apps that request OpenID Connect ID tokens to authenticate users.
|
||||
* Used for authenticating an end user.
|
||||
* Must be web based.
|
||||
2. Apps that consume ID tokens from other apps.
|
||||
* Needs to verify that a client is acting on behalf of a user.
|
||||
|
||||
The first category of apps are standard OAuth2 clients. Users show up at a website, and the application wants to authenticate those end users by pulling claims out of the ID token.
|
||||
|
||||
The second category of apps consume ID tokens as credentials. This lets another service handle OAuth2 flows, then use the ID token retrieved from dex to act on the end user's behalf with the app. An example of an app that falls into this category is the [Kubernetes API server][api-server].
|
||||
|
||||
## Requesting an ID token from dex
|
||||
|
||||
Apps that directly use dex to authenticate a user use OAuth2 code flows to request a token response. The exact steps taken are:
|
||||
|
||||
* User visits client app.
|
||||
* Client app redirects user to dex with an OAuth2 request.
|
||||
* Dex determines user's identity.
|
||||
* Dex redirects user to client with a code.
|
||||
* Client exchanges code with dex for an id_token.
|
||||
|
||||
![][dex-flow]
|
||||
|
||||
The dex repo contains a small [example app][example-app] as a working, self contained app that performs this flow.
|
||||
|
||||
The rest of this section explores the code sections which to help explain how to implementing this logic in your own app.
|
||||
|
||||
### Configuring your app
|
||||
|
||||
The example app uses the following Go packages to perform the code flow:
|
||||
|
||||
* [github.com/coreos/go-oidc][go-oidc]
|
||||
* [golang.org/x/oauth2][go-oauth2]
|
||||
|
||||
First, client details should be present in the dex configuration. For example, we could register an app with dex with the following section:
|
||||
|
||||
```yaml
|
||||
staticClients:
|
||||
- id: example-app
|
||||
secret: example-app-secret
|
||||
name: 'Example App'
|
||||
# Where the app will be running.
|
||||
redirectURIs:
|
||||
- 'http://127.0.0.1:5555/callback'
|
||||
```
|
||||
|
||||
In this case, the Go code would be configured as:
|
||||
|
||||
```go
|
||||
// Initialize a provider by specifying dex's issuer URL.
|
||||
provider, err := oidc.NewProvider(ctx, "https://dex-issuer-url.com")
|
||||
if err != nil {
|
||||
// handle error
|
||||
}
|
||||
|
||||
// Configure the OAuth2 config with the client values.
|
||||
oauth2Config := oauth2.Config{
|
||||
// client_id and client_secret of the client.
|
||||
ClientID: "example-app",
|
||||
ClientSecret: "example-app-secret",
|
||||
|
||||
// The redirectURL.
|
||||
RedirectURL: "http://127.0.0.1:5555/callback",
|
||||
|
||||
// Discovery returns the OAuth2 endpoints.
|
||||
Endpoint: provider.Endpoint(),
|
||||
|
||||
// "openid" is a required scope for OpenID Connect flows.
|
||||
//
|
||||
// Other scopes, such as "groups" can be requested.
|
||||
Scopes: []string{oidc.ScopeOpenID, "profile", "email", "groups"},
|
||||
}
|
||||
|
||||
// Create an ID token parser.
|
||||
idTokenVerifier := provider.Verifier(&oidc.Config{ClientID: "example-app"})
|
||||
```
|
||||
|
||||
The HTTP server should then redirect unauthenticated users to dex to initialize the OAuth2 flow.
|
||||
|
||||
```go
|
||||
// handleRedirect is used to start an OAuth2 flow with the dex server.
|
||||
func handleRedirect(w http.ResponseWriter, r *http.Request) {
|
||||
state := newState()
|
||||
http.Redirect(w, r, oauth2Config.AuthCodeURL(state), http.StatusFound)
|
||||
}
|
||||
```
|
||||
|
||||
After dex verifies the user's identity it redirects the user back to the client app with a code that can be exchanged for an ID token. The ID token can then be parsed by the verifier created above. This immediately
|
||||
|
||||
```go
|
||||
func handleOAuth2Callback(w http.ResponseWriter, r *http.Request) {
|
||||
state := r.URL.Query().Get("state")
|
||||
|
||||
// Verify state.
|
||||
|
||||
oauth2Token, err := oauth2Config.Exchange(ctx, r.URL.Query().Get("code"))
|
||||
if err != nil {
|
||||
// handle error
|
||||
}
|
||||
|
||||
// Extract the ID Token from OAuth2 token.
|
||||
rawIDToken, ok := oauth2Token.Extra("id_token").(string)
|
||||
if !ok {
|
||||
// handle missing token
|
||||
}
|
||||
|
||||
// Parse and verify ID Token payload.
|
||||
idToken, err := idTokenVerifier.Verify(ctx, rawIDToken)
|
||||
if err != nil {
|
||||
// handle error
|
||||
}
|
||||
|
||||
// Extract custom claims.
|
||||
var claims struct {
|
||||
Email string `json:"email"`
|
||||
Verified bool `json:"email_verified"`
|
||||
Groups []string `json:"groups"`
|
||||
}
|
||||
if err := idToken.Claims(&claims); err != nil {
|
||||
// handle error
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### State tokens
|
||||
|
||||
The state parameter is an arbitrary string that dex will always return with the callback. It plays a security role, preventing certain kinds of OAuth2 attacks. Specifically it can be used by clients to ensure:
|
||||
|
||||
* The user who started the flow is the one who finished it, by linking the user's session with the state token. For example, by setting the state as an HTTP cookie, then comparing it when the user returns to the app.
|
||||
* The request hasn't been replayed. This could be accomplished by associating some nonce in the state.
|
||||
|
||||
A more thorough discussion of these kinds of best practices can be found in the [_"OAuth 2.0 Threat Model and Security Considerations"_][oauth2-threat-model] RFC.
|
||||
|
||||
## Consuming ID tokens
|
||||
|
||||
Apps can also choose to consume ID tokens, letting other trusted clients handle the web flows for login. Clients pass along the ID tokens they receive from dex, usually as a bearer token, letting them act as the user to the backend service.
|
||||
|
||||
![][dex-backend-flow]
|
||||
|
||||
To accept ID tokens as user credentials, an app would construct an OpenID Connect verifier similarly to the above example. The verifier validates the ID token's signature, ensures it hasn't expired, etc. An important part of this code is that the verifier only trusts the example app's client. This ensures the example app is the one who's using the ID token, and not another, untrusted client.
|
||||
|
||||
```go
|
||||
// Initialize a provider by specifying dex's issuer URL.
|
||||
provider, err := oidc.NewProvider(ctx, "https://dex-issuer-url.com")
|
||||
if err != nil {
|
||||
// handle error
|
||||
}
|
||||
// Create an ID token parser, but only trust ID tokens issued to "example-app"
|
||||
idTokenVerifier := provider.Verifier(&oidc.Config{ClientID: "example-app"})
|
||||
```
|
||||
|
||||
The verifier can then be used to pull user info out of tokens:
|
||||
|
||||
```go
|
||||
type user struct {
|
||||
email string
|
||||
groups []string
|
||||
}
|
||||
|
||||
// authorize verifies a bearer token and pulls user information form the claims.
|
||||
func authorize(ctx context.Context, bearerToken string) (*user, error) {
|
||||
idToken, err := idTokenVerifier.Verify(ctx, bearerToken)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("could not verify bearer token: %v", err)
|
||||
}
|
||||
// Extract custom claims.
|
||||
var claims struct {
|
||||
Email string `json:"email"`
|
||||
Verified bool `json:"email_verified"`
|
||||
Groups []string `json:"groups"`
|
||||
}
|
||||
if err := idToken.Claims(&claims); err != nil {
|
||||
return nil, fmt.Errorf("failed to parse claims: %v", err)
|
||||
}
|
||||
if !claims.Verified {
|
||||
return nil, fmt.Errorf("email (%q) in returned claims was not verified", claims.Email)
|
||||
}
|
||||
return &user{claims.Email, claims.Groups}, nil
|
||||
}
|
||||
```
|
||||
|
||||
[api-server]: https://kubernetes.io/docs/admin/authentication/#openid-connect-tokens
|
||||
[dex-flow]: img/dex-flow.png
|
||||
[dex-backend-flow]: img/dex-backend-flow.png
|
||||
[example-app]: ../examples/example-app
|
||||
[oauth2-threat-model]: https://tools.ietf.org/html/rfc6819
|
||||
[go-oidc]: https://godoc.org/github.com/coreos/go-oidc
|
||||
[go-oauth2]: https://godoc.org/golang.org/x/oauth2
|
|
@ -1,47 +0,0 @@
|
|||
# Dex v2
|
||||
|
||||
## Streamlined deployments
|
||||
|
||||
Many of the changes between v1 and v2 were aimed at making dex easier to deploy and manage, perhaps the biggest pain point for dex v1. Dex is now a single, scalable binary with a sole source of configuration. Many components which previously had to be set through the API, such as OAuth2 clients and IDP connectors can now be specified statically. The new architecture lacks a singleton component eliminating deployment ordering. There are no more special development modes; instructions for running dex on a workstation translate with minimal changes to a production system.
|
||||
|
||||
All of this results in a much simpler deployment story. Write a config file, run the dex binary, and that's it.
|
||||
|
||||
## More storage backends
|
||||
|
||||
Dex's internal storage interface has been improved to support multiple backing databases including Postgres, SQLite3, and the Kubernetes API through Third Party Resources. This allows dex to meet a more diverse set of use cases instead of insisting on one particular deployment pattern. For example, The Kubernetes API implementation, a [key value store][k8s-api-docs], allows dex to be run natively on top of a Kubernetes cluster with extremely little administrative overhead. Starting with support for multiple storage backends also should help ensure that the dex storage interface is actually pluggable, rather than being coupled too tightly with a single implementation.
|
||||
|
||||
A more in depth discussion of existing storage options and how to add new ones can be found [here][storage-docs].
|
||||
|
||||
## Additional improvements
|
||||
|
||||
The rewrite came with several, miscellaneous improvements including:
|
||||
|
||||
* More powerful connectors. For example the GitHub connector can now query for teams.
|
||||
* Combined the two APIs into a single [gRPC API][api-docs] with no complex authorization rules.
|
||||
* Expanded OAuth2 capabilities such as the implicit flow.
|
||||
* Simplified codebase and improved testing.
|
||||
|
||||
## Rethinking registration
|
||||
|
||||
Dex v1 performed well when it could manage users. It provided features such as registration, email invites, password resets, administrative abilities, etc. However, login flows and APIs remain tightly coupled with concepts like registration and admin users even when v1 federated to an upstream identity provider (IDP) where it likely only had read only access to the actual user database.
|
||||
|
||||
Many of v2's use cases focus on federation to other IPDs rather than managing users itself. Because of this, options associated with registration, such as SMTP credentials, have been removed. We hope to add registration and user management back into the project through orthogonal applications using the [gRPC API][api-docs], but in a way that doesn't impact other use cases.
|
||||
|
||||
## Removed features
|
||||
|
||||
Dex v2 lacks certain features present in v1. For the most part _we aim to add most of these features back into v2_, but in a way that installations have to _opt in_ to a feature instead of burdening every deployment with extra configuration.
|
||||
|
||||
Notable missing features include:
|
||||
|
||||
* Registration flows.
|
||||
* Local user management.
|
||||
* SMTP configuration and email verification.
|
||||
* Several of the login connectors that have yet to be ported.
|
||||
|
||||
## Support for dex v1
|
||||
|
||||
Dex v1 will continue to live under the `github.com/dexidp/dex` repo on a branch. Bug fixes and minor changes will continue to be accepted, but development of new features by the dex team will largely cease.
|
||||
|
||||
[k8s-api-docs]: http://kubernetes.io/docs/api/
|
||||
[storage-docs]: ./storage.md
|
||||
[api-docs]: ./api.md
|
42
README.md
42
README.md
|
@ -49,7 +49,7 @@ For details on how to request or validate an ID Token, see [_"Writing apps that
|
|||
|
||||
Dex's main production use is as an auth-N addon in CoreOS's enterprise Kubernetes solution, [Tectonic][tectonic]. Dex runs natively on top of any Kubernetes cluster using Third Party Resources and can drive API server authentication through the OpenID Connect plugin. Clients, such as the [Tectonic Console][tectonic-console] and `kubectl`, can act on behalf users who can login to the cluster through any identity provider dex supports.
|
||||
|
||||
More docs for running dex as a Kubernetes authenticator can be found [here](Documentation/kubernetes.md).
|
||||
More docs for running dex as a Kubernetes authenticator can be found [here](https://dexidp.io/docs/kubernetes/).
|
||||
|
||||
## Connectors
|
||||
|
||||
|
@ -65,19 +65,19 @@ Dex implements the following connectors:
|
|||
|
||||
| Name | supports refresh tokens | supports groups claim | supports preferred_username claim | status | notes |
|
||||
| ---- | ----------------------- | --------------------- | --------------------------------- | ------ | ----- |
|
||||
| [LDAP](Documentation/connectors/ldap.md) | yes | yes | yes | stable | |
|
||||
| [GitHub](Documentation/connectors/github.md) | yes | yes | yes | stable | |
|
||||
| [SAML 2.0](Documentation/connectors/saml.md) | no | yes | no | stable |
|
||||
| [GitLab](Documentation/connectors/gitlab.md) | yes | yes | yes | beta | |
|
||||
| [OpenID Connect](Documentation/connectors/oidc.md) | yes | yes | yes | beta | Includes Salesforce, Azure, etc. |
|
||||
| [Google](Documentation/connectors/google.md) | yes | yes | yes | alpha | |
|
||||
| [LinkedIn](Documentation/connectors/linkedin.md) | yes | no | no | beta | |
|
||||
| [Microsoft](Documentation/connectors/microsoft.md) | yes | yes | no | beta | |
|
||||
| [AuthProxy](Documentation/connectors/authproxy.md) | no | no | no | alpha | Authentication proxies such as Apache2 mod_auth, etc. |
|
||||
| [Bitbucket Cloud](Documentation/connectors/bitbucketcloud.md) | yes | yes | no | alpha | |
|
||||
| [OpenShift](Documentation/connectors/openshift.md) | no | yes | no | stable | |
|
||||
| [Atlassian Crowd](Documentation/connectors/atlassiancrowd.md) | yes | yes | yes *) | beta | preferred_username claim must be configured through config |
|
||||
| [Gitea](Documentation/connectors/gitea.md) | yes | no | yes | alpha | |
|
||||
| [LDAP](https://dexidp.io/docs/connectors/ldap/) | yes | yes | yes | stable | |
|
||||
| [GitHub](https://dexidp.io/docs/connectors/github/) | yes | yes | yes | stable | |
|
||||
| [SAML 2.0](https://dexidp.io/docs/connectors/saml/) | no | yes | no | stable |
|
||||
| [GitLab](https://dexidp.io/docs/connectors/gitlab/) | yes | yes | yes | beta | |
|
||||
| [OpenID Connect](https://dexidp.io/docs/connectors/oidc/) | yes | yes | yes | beta | Includes Salesforce, Azure, etc. |
|
||||
| [Google](https://dexidp.io/docs/connectors/google/) | yes | yes | yes | alpha | |
|
||||
| [LinkedIn](https://dexidp.io/docs/connectors/linkedin/) | yes | no | no | beta | |
|
||||
| [Microsoft](https://dexidp.io/docs/connectors/microsoft/) | yes | yes | no | beta | |
|
||||
| [AuthProxy](https://dexidp.io/docs/connectors/authproxy/) | no | no | no | alpha | Authentication proxies such as Apache2 mod_auth, etc. |
|
||||
| [Bitbucket Cloud](https://dexidp.io/docs/connectors/bitbucketcloud/) | yes | yes | no | alpha | |
|
||||
| [OpenShift](https://dexidp.io/docs/connectors/openshift/) | no | yes | no | stable | |
|
||||
| [Atlassian Crowd](https://dexidp.io/docs/connectors/atlassiancrowd/) | yes | yes | yes * | beta | preferred_username claim must be configured through config |
|
||||
| [Gitea](https://dexidp.io/docs/connectors/gitea/) | yes | no | yes | alpha | |
|
||||
|
||||
Stable, beta, and alpha are defined as:
|
||||
|
||||
|
@ -89,14 +89,14 @@ All changes or deprecations of connector features will be announced in the [rele
|
|||
|
||||
## Documentation
|
||||
|
||||
* [Getting started](Documentation/getting-started.md)
|
||||
* [Intro to OpenID Connect](Documentation/openid-connect.md)
|
||||
* [Getting started](https://dexidp.io/docs/getting-started/)
|
||||
* [Intro to OpenID Connect](https://dexidp.io/docs/openid-connect/)
|
||||
* [Writing apps that use dex][using-dex]
|
||||
* [What's new in v2](Documentation/v2.md)
|
||||
* [Custom scopes, claims, and client features](Documentation/custom-scopes-claims-clients.md)
|
||||
* [Storage options](Documentation/storage.md)
|
||||
* [gRPC API](Documentation/api.md)
|
||||
* [Using Kubernetes with dex](Documentation/kubernetes.md)
|
||||
* [What's new in v2](https://dexidp.io/docs/v2/)
|
||||
* [Custom scopes, claims, and client features](https://dexidp.io/docs/custom-scopes-claims-clients/)
|
||||
* [Storage options](https://dexidp.io/docs/storage/)
|
||||
* [gRPC API](https://dexidp.io/docs/api/)
|
||||
* [Using Kubernetes with dex](https://dexidp.io/docs/kubernetes/)
|
||||
* Client libraries
|
||||
* [Go][go-oidc]
|
||||
|
||||
|
|
Reference in a new issue