Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cache JWKS for OIDC/JWT based join methods #49213

Open
strideynet opened this issue Nov 19, 2024 · 0 comments
Open

Cache JWKS for OIDC/JWT based join methods #49213

strideynet opened this issue Nov 19, 2024 · 0 comments
Labels
feature-request Used for new features in Teleport, improvements to current should be #enhancements

Comments

@strideynet
Copy link
Contributor

We should introduce a cache over fetched JWKS/OpenID configuration documents from delegated identity providers. A short TTL should be sufficient (e.g minutes)

Why?

  • Reduce latency of JWT/OIDC based join methods. Today, for these to complete, Teleport must complete one or two roundtrips to the upstream identity provider.
  • Reduce load on the upstream and on Teleport itself in cases of a stampeding herd of joins.
  • Improve reliability by mitigating the impact of short outages of the upstream identity provider or network blips.

The cache TTL shouldn't be too long - we want to ensure we're notified of changes to the JWKS and react to these quickly - or JWTs issued by a new keypair may be considered invalid by Teleport.

@strideynet strideynet added the feature-request Used for new features in Teleport, improvements to current should be #enhancements label Nov 19, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature-request Used for new features in Teleport, improvements to current should be #enhancements
Projects
None yet
Development

No branches or pull requests

1 participant