Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add PS256 and EdDSA signature algorithms to AWX when using OIDC #15127

Open
4 of 9 tasks
jean-christophe-manciot opened this issue Apr 22, 2024 · 0 comments
Open
4 of 9 tasks

Comments

@jean-christophe-manciot

Please confirm the following

  • I agree to follow this project's code of conduct.
  • I have checked the current issues for duplicates.
  • I understand that AWX is open source software provided for free and that I might not receive a timely response.

Feature type

New Feature

Feature Summary

Logging in using OIDC is successful when RS256 is set on the IDP (keycloak in my case), but unsuccessful when PS256 or EdDSA is set.

"Use EdDSA where possible and use ECDSA when it is not. If you are forced to use RSA, prefer RSASSA-PSS [PS256] over RSASSA-PKCS1-v1_5 [RS256]" (quoted from “JWTs: Which Signing Algorithm Should I Use?”).

Select the relevant components

  • UI
  • API
  • Docs
  • Collection
  • CLI
  • Other

Steps to reproduce

  • Set PS256 or EdDSA as the signature algorithm on the IDP side such as keycloak
  • configure OIDC settings on AWX pointing to that IDP
  • login with OIDC

Current results

Login is unsuccessful

Sugested feature result

stronger security

Additional information

  • OpenBanking has already made the transition to PS256 since 03/2019
  • Australian infosec has a requirement for PS256 since 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant