-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
update wis2box-auth to utilize Keycloak #488
Comments
Consideration for a workaround: update wis2box-auth to lock down |
Bump to next sprint for review/discussion of @isedwards' PR. |
@tomkralidis to setup catch-up discussion for @isedwards on past / future PR |
2024-01-17:
|
2024-02-06: @maaikelimper to help on completing integration with the rest of the wis2box stack. |
2024-02-13: @maaikelimper to continue following priority integrations in this sprint. |
The current wis2box authentication and authorization workflow uses wis2box-auth to manage and authorize dataset access if specified by the wis2box administrator.
wis2box
command-line utilities provide token management interfacing withwis2box-auth
. API and UI requests on authorized data are sub-requested in nginx against wis2box-auth.Driven by #479, we decide to add a Keycloak for enhanced authentication workflow/options, and update of wis2box-auth to interface with keycloak for authorization management. API and UI users would, then, enter username/password information, which would result in a cookie utiliized as part of the browser session (in addition to direct API access/workflow via CLI or JavaScript, for example).
The text was updated successfully, but these errors were encountered: