Releases: openziti/ziti
v1.5.11
Release 1.5.11
What's New
Update libraries and build with the latest Go version.
v1.8.0-pre5
Release 1.8.0
What's New
- controllers can now optionally bind APIs using a OpenZiti identity
ziti edge loginnow supports the--network-identityflag to authenticate and establish connections through the Ziti overlay networkziti edge loginnow supports using a bearer token with--tokenfor authentication. The token is expected to be
provided as just the JWT, not with the "Bearer " prefix- identity configuration can now be loaded from files or environment variables for flexible deployment scenarios
- OIDC/JWT Token-based Enrollment
- Clustering Performance Improvements
- Basic permissions model (BETA)
- Enable the tls handshake rate limiter by default
- Enable authentication related model updates to be non-blocking and even dropped if the system is too busy
Binding Controller APIs With Identity
Controller APIs can now be bound to an OpenZiti overlay network identity, allowing secure communication through
the Ziti network. This is useful for scenarios where you want to expose controller APIs only through the overlay
network rather than on a standard network interface.
Configuration Structure
A standard bindPoint configuration looks like this:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
To bind controller APIs to an OpenZiti identity, add an additional identity block to your bindPoints. The
identity configuration specifies where to load the Ziti identity file and which service to bind it to:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
- identity:
file: "c:/temp/ctrl.testing/ctrl.identity.json"
service: "mgmt"
Supported Configuration Options
file: Path to a Ziti identity JSON file containing the controller's identity and enrollment certificateenv: Name of an environment variable containing a base64-encoded Ziti identity (alternative tofile)service: The name of the Ziti service to bind the controller API to
Using Environment Variables
For deployments where storing identity files on disk is not preferred, you can reference a base64-encoded
identity file from an environment variable. The environment variable should contain the base64-encoded contents
of the identity JSON file.
For example, if an environment variable named ZITI_CTRL_IDENTITY contains a base64-encoded identity file:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
- identity:
env: ZITI_CTRL_IDENTITY
service: "mgmt"
IPv6 Support
Both IPv4 and IPv6 addresses are supported for standard bind points. IPv6 addresses should be specified in bracket
notation with a port number:
bindPoints:
- interface: "[::1]:18441"
address: "[::1]:18441"
- identity:
file: "/path/to/identity.json"
service: "mgmt"
CLI Enhancements for Identity-Based Connections
The ziti edge login command and REST client utilities have been enhanced to support identity-based connections
through the Ziti overlay network.
New --network-identity Flag for ziti edge login
The ziti edge login command now includes a --network-identity flag that allows you to authenticate to a Ziti
controller through the overlay network using a Ziti identity:
ziti edge login https://ziti.mgmt.apis.local:1280 \
--username myuser \
--password mypass \
--network-identity /path/to/identity.jsonThis is useful when the controller is only accessible through the Ziti overlay network or when you want to ensure
all communication to the controller flows through the overlay for security purposes.
Identity Resolution Order
When establishing connections, identities are resolved in the following order:
- Command-line flag: The
--network-identityflag takes precedence - Environment variable: If
ZITI_CLI_NETWORK_IDis set and contains a base64-encoded identity, it is used - Cached identity file: If a network identity was saved from a previous login in the Ziti config directory, it may be used
This layered approach allows for flexibility in deployment scenarios:
- Development: Use command-line flags for quick testing
- Automation: Use environment variables in CI/CD pipelines
- Production: Cache identities securely for repeated access
Dialing Modes When Authenticating
The CLI supports two dialing modes:
Intercept-based Dialing (Default)
By default, URLs are expected to leverage intercepts. Create a service with an appropriate intercept config and use
the intercept address when dialing. This is the standard mode for most use cases. For example, given a service with
the intercept ziti.mgmt.apis.local
ziti edge login https://ziti.mgmt.apis.local:1280 \
--username myuser \
--password mypass \
--network-identity /path/to/identity.jsonIdentity-aware Dialing (Addressable Terminators)
To support addressable terminators-based dialing, specify a user in the URL. This activates dial-by-identity
functionality. The URL format should be identity-to-dial@service-name-to-dial. For example:
ziti edge login https://my-identity@my-service:1280 \
--username myuser \
--password mypass \
--network-identity /path/to/identity.jsonIn this mode, the transport extracts the identity from the URL and uses it to establish a direct connection to
the specified service via the addressable terminator.
Binding Controller APIs With Identity
It's now possible to bind controller APIs to an OpenZiti overlay network identity. To bind a given controller
API to an OpenZiti identity, add a section to the desired bindPoint section. For example a common bindPoint
configuration might look like:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
To bind any declared APIs to a given OpenZiti identity add an identity block:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
- identity:
file: "c:/temp/ctrl.testing/clint.ctrl.json"
service: "mgmt"
It's possible to refer to an environment variable for the identity file if desired. Add an environment variable with
the contents of the environment variable the identity file base64 encoded. For example if an environment is defined
with the name ZITI_ID_EXAMPLE and contains a base64 encoded identity file, the following bindPoint block can be used:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
- identity:
env: ZITI_ID_EXAMPLE
service: "mgmt"
OIDC/JWT Token-based Enrollment
OpenZiti now supports provisioning identities just-in-time through OIDC/JWT token enrollment. External identity
providers can be configured to allow identities to enroll using JWT tokens, with support for the resulting
identities to use certificate or token authentication.
External JWT Signer Configuration
External JWT signers are configured via the Edge Management API to define enrollment behavior with the following new
enrollment-specific properties:
-
enrollToCertEnabled - When enabled, identities can exchange a JWT token and a certificate signing request (CSR)
for a client certificate during enrollment. The certificate can then be used for standard certificate-based
authentication. -
enrollToTokenEnabled - When enabled, identities can use a JWT token to enroll. The current token or future tokens
may be used for authentication. -
enrollNameClaimsSelector - Specifies which JWT claim contains the identity name. Accepts a JSON pointer
(e.g.,/preferred_username) or a simple property name (e.g.,preferred_username, automatically converted to
/preferred_username). Defaults to/subif not specified. The extracted value becomes the identity name in Ziti. -
enrollAttributeClaimsSelector - Specifies which JWT claims to extract as identity attributes during enrollment.
Accepts a JSON pointer (e.g.,/roles) or a simple property name (e.g.,roles). Extracted attributes are
applied to the newly enrolled identity for use in authorization policies. -
enrollAuthPolicyId - Specifies the authentication policy to apply to newly enrolled identities. This determines
what authentication methods are available for the identity post-enrollment.
Additionally the existing property named claimsProperty that specifies external id to match identities to:
- now supports a JSON pointer (e.g.,
/id) or a simple property name (e.g.,id) - is used to populate the
externalIdfield of the identity
Enrollment Paths
Certificate Enrollment (enrollToCertEnabled)
When certificate enrollment is enabled, unauthenticated users can:
- Obtain a list of available IdPs from the public Edge Client API
GET /external-jwt-signersendpoint, where
enrollToCertEnabledis set totrue - Obtain a JWT from the configured OIDC provider
- Generate a certificate signing request (CSR)
- Submit an enrollment request with the JWT and CSR
- Have their identity created in Ziti with attributes extracted from JWT claims
- Receive a signed client certificate for certificate-based authentication
Token Enrollment (enrollToTokenEnabled)
When token enrollment is enabled, unauthenticated users can:
- Obtain a list of available IdPs from the public Edge Client API
GET /external-jwt-signersendpoint, where
enrollToTokenEnabledis set totrue - Obtain a JWT from the configured OIDC provider
- Submit an enrollment request with the JWT
- Have their identity created in Ziti with attributes extracted from JWT claims
- Receive a Ziti API token for token-based authentication
Edge Management API
The Edge Management API provides full CRUD operations for configuring external JWT signers:
- `POST /exter...
v1.5.10
Release 1.5.10
What's New
Update libraries and build with the latest Go version.
Component Updates and Bug Fixes
-
github.com/openziti/agent: v1.0.26 -> v1.0.33
- Issue #27 - Add support for generating heap dumps
-
github.com/openziti/channel/v3: v3.0.39 -> v3.0.40
-
github.com/openziti/foundation/v2: v2.0.77 -> v2.0.81
- Issue #464 - Add support for -pre in versions
-
github.com/openziti/identity: v1.0.100 -> v1.0.120
-
github.com/openziti/metrics: v1.3.0 -> v1.4.3
-
github.com/openziti/runzmd: v1.0.83 -> v1.0.84
-
github.com/openziti/secretstream: v0.1.32 -> v0.1.42
-
github.com/openziti/transport/v2: v2.0.167 -> v2.0.200
-
github.com/openziti/ziti: v1.5.9 -> v1.5.10
v1.8.0-pre4
Release 1.8.0
What's New
- controllers can now optionally bind APIs using a OpenZiti identity
ziti edge loginnow supports the--network-identityflag to authenticate and establish connections through the Ziti overlay networkziti edge loginnow supports using a bearer token with--tokenfor authentication. The token is expected to be
provided as just the JWT, not with the "Bearer " prefix- identity configuration can now be loaded from files or environment variables for flexible deployment scenarios
- OIDC/JWT Token-based Enrollment
- Clustering Performance Improvements
- Entity level permissions model (BETA)
Binding Controller APIs With Identity
Controller APIs can now be bound to an OpenZiti overlay network identity, allowing secure communication through
the Ziti network. This is useful for scenarios where you want to expose controller APIs only through the overlay
network rather than on a standard network interface.
Configuration Structure
A standard bindPoint configuration looks like this:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
To bind controller APIs to an OpenZiti identity, add an additional identity block to your bindPoints. The
identity configuration specifies where to load the Ziti identity file and which service to bind it to:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
- identity:
file: "c:/temp/ctrl.testing/ctrl.identity.json"
service: "mgmt"
Supported Configuration Options
file: Path to a Ziti identity JSON file containing the controller's identity and enrollment certificateenv: Name of an environment variable containing a base64-encoded Ziti identity (alternative tofile)service: The name of the Ziti service to bind the controller API to
Using Environment Variables
For deployments where storing identity files on disk is not preferred, you can reference a base64-encoded
identity file from an environment variable. The environment variable should contain the base64-encoded contents
of the identity JSON file.
For example, if an environment variable named ZITI_CTRL_IDENTITY contains a base64-encoded identity file:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
- identity:
env: ZITI_CTRL_IDENTITY
service: "mgmt"
IPv6 Support
Both IPv4 and IPv6 addresses are supported for standard bind points. IPv6 addresses should be specified in bracket
notation with a port number:
bindPoints:
- interface: "[::1]:18441"
address: "[::1]:18441"
- identity:
file: "/path/to/identity.json"
service: "mgmt"
CLI Enhancements for Identity-Based Connections
The ziti edge login command and REST client utilities have been enhanced to support identity-based connections
through the Ziti overlay network.
New --network-identity Flag for ziti edge login
The ziti edge login command now includes a --network-identity flag that allows you to authenticate to a Ziti
controller through the overlay network using a Ziti identity:
ziti edge login https://ziti.mgmt.apis.local:1280 \
--username myuser \
--password mypass \
--network-identity /path/to/identity.jsonThis is useful when the controller is only accessible through the Ziti overlay network or when you want to ensure
all communication to the controller flows through the overlay for security purposes.
Identity Resolution Order
When establishing connections, identities are resolved in the following order:
- Command-line flag: The
--network-identityflag takes precedence - Environment variable: If
ZITI_CLI_NETWORK_IDis set and contains a base64-encoded identity, it is used - Cached identity file: If a network identity was saved from a previous login in the Ziti config directory, it may be used
This layered approach allows for flexibility in deployment scenarios:
- Development: Use command-line flags for quick testing
- Automation: Use environment variables in CI/CD pipelines
- Production: Cache identities securely for repeated access
Dialing Modes When Authenticating
The CLI supports two dialing modes:
Intercept-based Dialing (Default)
By default, URLs are expected to leverage intercepts. Create a service with an appropriate intercept config and use
the intercept address when dialing. This is the standard mode for most use cases. For example, given a service with
the intercept ziti.mgmt.apis.local
ziti edge login https://ziti.mgmt.apis.local:1280 \
--username myuser \
--password mypass \
--network-identity /path/to/identity.jsonIdentity-aware Dialing (Addressable Terminators)
To support addressable terminators-based dialing, specify a user in the URL. This activates dial-by-identity
functionality. The URL format should be identity-to-dial@service-name-to-dial. For example:
ziti edge login https://my-identity@my-service:1280 \
--username myuser \
--password mypass \
--network-identity /path/to/identity.jsonIn this mode, the transport extracts the identity from the URL and uses it to establish a direct connection to
the specified service via the addressable terminator.
Binding Controller APIs With Identity
It's now possible to bind controller APIs to an OpenZiti overlay network identity. To bind a given controller
API to an OpenZiti identity, add a section to the desired bindPoint section. For example a common bindPoint
configuration might look like:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
To bind any declared APIs to a given OpenZiti identity add an identity block:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
- identity:
file: "c:/temp/ctrl.testing/clint.ctrl.json"
service: "mgmt"
It's possible to refer to an environment variable for the identity file if desired. Add an environment variable with
the contents of the environment variable the identity file base64 encoded. For example if an environment is defined
with the name ZITI_ID_EXAMPLE and contains a base64 encoded identity file, the following bindPoint block can be used:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
- identity:
env: ZITI_ID_EXAMPLE
service: "mgmt"
OIDC/JWT Token-based Enrollment
OpenZiti now supports provisioning identities just-in-time through OIDC/JWT token enrollment. External identity
providers can be configured to allow identities to enroll using JWT tokens, with support for the resulting
identities to use certificate or token authentication.
External JWT Signer Configuration
External JWT signers are configured via the Edge Management API to define enrollment behavior with the following new
enrollment-specific properties:
-
enrollToCertEnabled - When enabled, identities can exchange a JWT token and a certificate signing request (CSR)
for a client certificate during enrollment. The certificate can then be used for standard certificate-based
authentication. -
enrollToTokenEnabled - When enabled, identities can use a JWT token to enroll. The current token or future tokens
may be used for authentication. -
enrollNameClaimsSelector - Specifies which JWT claim contains the identity name. Accepts a JSON pointer
(e.g.,/preferred_username) or a simple property name (e.g.,preferred_username, automatically converted to
/preferred_username). Defaults to/subif not specified. The extracted value becomes the identity name in Ziti. -
enrollAttributeClaimsSelector - Specifies which JWT claims to extract as identity attributes during enrollment.
Accepts a JSON pointer (e.g.,/roles) or a simple property name (e.g.,roles). Extracted attributes are
applied to the newly enrolled identity for use in authorization policies. -
enrollAuthPolicyId - Specifies the authentication policy to apply to newly enrolled identities. This determines
what authentication methods are available for the identity post-enrollment.
Additionally the existing property named claimsProperty that specifies external id to match identities to:
- now supports a JSON pointer (e.g.,
/id) or a simple property name (e.g.,id) - is used to populate the
externalIdfield of the identity
Enrollment Paths
Certificate Enrollment (enrollToCertEnabled)
When certificate enrollment is enabled, unauthenticated users can:
- Obtain a list of available IdPs from the public Edge Client API
GET /external-jwt-signersendpoint, where
enrollToCertEnabledis set totrue - Obtain a JWT from the configured OIDC provider
- Generate a certificate signing request (CSR)
- Submit an enrollment request with the JWT and CSR
- Have their identity created in Ziti with attributes extracted from JWT claims
- Receive a signed client certificate for certificate-based authentication
Token Enrollment (enrollToTokenEnabled)
When token enrollment is enabled, unauthenticated users can:
- Obtain a list of available IdPs from the public Edge Client API
GET /external-jwt-signersendpoint, where
enrollToTokenEnabledis set totrue - Obtain a JWT from the configured OIDC provider
- Submit an enrollment request with the JWT
- Have their identity created in Ziti with attributes extracted from JWT claims
- Receive a Ziti API token for token-based authentication
Edge Management API
The Edge Management API provides full CRUD operations for configuring external JWT signers:
POST /external-jwt-signers- Create a new external JWT signer with all configuration optionsGET /external-jwt-signers- List all configured external JWT sign...
v1.8.0-pre3
Release 1.8.0
What's New
- controllers can now optionally bind APIs using a OpenZiti identity
ziti edge loginnow supports the--network-identityflag to authenticate and establish connections through the Ziti overlay networkziti edge loginnow supports using a bearer token with--tokenfor authentication. The token is expected to be
provided as just the JWT, not with the "Bearer " prefix- identity configuration can now be loaded from files or environment variables for flexible deployment scenarios
- OIDC/JWT Token-based Enrollment
- Clustering Performance Improvements
Binding Controller APIs With Identity
Controller APIs can now be bound to an OpenZiti overlay network identity, allowing secure communication through
the Ziti network. This is useful for scenarios where you want to expose controller APIs only through the overlay
network rather than on a standard network interface.
Configuration Structure
A standard bindPoint configuration looks like this:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
To bind controller APIs to an OpenZiti identity, add an additional identity block to your bindPoints. The
identity configuration specifies where to load the Ziti identity file and which service to bind it to:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
- identity:
file: "c:/temp/ctrl.testing/ctrl.identity.json"
service: "mgmt"
Supported Configuration Options
file: Path to a Ziti identity JSON file containing the controller's identity and enrollment certificateenv: Name of an environment variable containing a base64-encoded Ziti identity (alternative tofile)service: The name of the Ziti service to bind the controller API to
Using Environment Variables
For deployments where storing identity files on disk is not preferred, you can reference a base64-encoded
identity file from an environment variable. The environment variable should contain the base64-encoded contents
of the identity JSON file.
For example, if an environment variable named ZITI_CTRL_IDENTITY contains a base64-encoded identity file:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
- identity:
env: ZITI_CTRL_IDENTITY
service: "mgmt"
IPv6 Support
Both IPv4 and IPv6 addresses are supported for standard bind points. IPv6 addresses should be specified in bracket
notation with a port number:
bindPoints:
- interface: "[::1]:18441"
address: "[::1]:18441"
- identity:
file: "/path/to/identity.json"
service: "mgmt"
CLI Enhancements for Identity-Based Connections
The ziti edge login command and REST client utilities have been enhanced to support identity-based connections
through the Ziti overlay network.
New --network-identity Flag for ziti edge login
The ziti edge login command now includes a --network-identity flag that allows you to authenticate to a Ziti
controller through the overlay network using a Ziti identity:
ziti edge login https://ziti.mgmt.apis.local:1280 \
--username myuser \
--password mypass \
--network-identity /path/to/identity.jsonThis is useful when the controller is only accessible through the Ziti overlay network or when you want to ensure
all communication to the controller flows through the overlay for security purposes.
Identity Resolution Order
When establishing connections, identities are resolved in the following order:
- Command-line flag: The
--network-identityflag takes precedence - Environment variable: If
ZITI_CLI_NETWORK_IDis set and contains a base64-encoded identity, it is used - Cached identity file: If a network identity was saved from a previous login in the Ziti config directory, it may be used
This layered approach allows for flexibility in deployment scenarios:
- Development: Use command-line flags for quick testing
- Automation: Use environment variables in CI/CD pipelines
- Production: Cache identities securely for repeated access
Dialing Modes When Authenticating
The CLI supports two dialing modes:
Intercept-based Dialing (Default)
By default, URLs are expected to leverage intercepts. Create a service with an appropriate intercept config and use
the intercept address when dialing. This is the standard mode for most use cases. For example, given a service with
the intercept ziti.mgmt.apis.local
ziti edge login https://ziti.mgmt.apis.local:1280 \
--username myuser \
--password mypass \
--network-identity /path/to/identity.jsonIdentity-aware Dialing (Addressable Terminators)
To support addressable terminators-based dialing, specify a user in the URL. This activates dial-by-identity
functionality. The URL format should be identity-to-dial@service-name-to-dial. For example:
ziti edge login https://my-identity@my-service:1280 \
--username myuser \
--password mypass \
--network-identity /path/to/identity.jsonIn this mode, the transport extracts the identity from the URL and uses it to establish a direct connection to
the specified service via the addressable terminator.
Binding Controller APIs With Identity
It's now possible to bind controller APIs to an OpenZiti overlay network identity. To bind a given controller
API to an OpenZiti identity, add a section to the desired bindPoint section. For example a common bindPoint
configuration might look like:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
To bind any declared APIs to a given OpenZiti identity add an identity block:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
- identity:
file: "c:/temp/ctrl.testing/clint.ctrl.json"
service: "mgmt"
It's possible to refer to an environment variable for the identity file if desired. Add an environment variable with
the contents of the environment variable the identity file base64 encoded. For example if an environment is defined
with the name ZITI_ID_EXAMPLE and contains a base64 encoded identity file, the following bindPoint block can be used:
bindPoints:
- interface: 127.0.0.1:18441
address: 127.0.0.1:18441
- identity:
env: ZITI_ID_EXAMPLE
service: "mgmt"
OIDC/JWT Token-based Enrollment
OpenZiti now supports provisioning identities just-in-time through OIDC/JWT token enrollment. External identity
providers can be configured to allow identities to enroll using JWT tokens, with support for the resulting
identities to use certificate or token authentication.
External JWT Signer Configuration
External JWT signers are configured via the Edge Management API to define enrollment behavior with the following new
enrollment-specific properties:
-
enrollToCertEnabled - When enabled, identities can exchange a JWT token and a certificate signing request (CSR)
for a client certificate during enrollment. The certificate can then be used for standard certificate-based
authentication. -
enrollToTokenEnabled - When enabled, identities can use a JWT token to enroll. The current token or future tokens
may be used for authentication. -
enrollNameClaimsSelector - Specifies which JWT claim contains the identity name. Accepts a JSON pointer
(e.g.,/preferred_username) or a simple property name (e.g.,preferred_username, automatically converted to
/preferred_username). Defaults to/subif not specified. The extracted value becomes the identity name in Ziti. -
enrollAttributeClaimsSelector - Specifies which JWT claims to extract as identity attributes during enrollment.
Accepts a JSON pointer (e.g.,/roles) or a simple property name (e.g.,roles). Extracted attributes are
applied to the newly enrolled identity for use in authorization policies. -
enrollAuthPolicyId - Specifies the authentication policy to apply to newly enrolled identities. This determines
what authentication methods are available for the identity post-enrollment.
Additionally the existing property named claimsProperty that specifies external id to match identities to:
- now supports a JSON pointer (e.g.,
/id) or a simple property name (e.g.,id) - is used to populate the
externalIdfield of the identity
Enrollment Paths
Certificate Enrollment (enrollToCertEnabled)
When certificate enrollment is enabled, unauthenticated users can:
- Obtain a list of available IdPs from the public Edge Client API
GET /external-jwt-signersendpoint, where
enrollToCertEnabledis set totrue - Obtain a JWT from the configured OIDC provider
- Generate a certificate signing request (CSR)
- Submit an enrollment request with the JWT and CSR
- Have their identity created in Ziti with attributes extracted from JWT claims
- Receive a signed client certificate for certificate-based authentication
Token Enrollment (enrollToTokenEnabled)
When token enrollment is enabled, unauthenticated users can:
- Obtain a list of available IdPs from the public Edge Client API
GET /external-jwt-signersendpoint, where
enrollToTokenEnabledis set totrue - Obtain a JWT from the configured OIDC provider
- Submit an enrollment request with the JWT
- Have their identity created in Ziti with attributes extracted from JWT claims
- Receive a Ziti API token for token-based authentication
Edge Management API
The Edge Management API provides full CRUD operations for configuring external JWT signers:
POST /external-jwt-signers- Create a new external JWT signer with all configuration optionsGET /external-jwt-signers- List all configured external JWT signersGET /external-jwt-signers/{id}-...
v1.6.12
v1.6.10
Release 1.6.10
What's New
- Bug fixes
Component Updates and Bug Fixes
- github.com/openziti/ziti: v1.6.9 -> v1.6.10
- Issue #3420 - The terminator id cache uses the same id for all terminators in a host.v2 config, resulting in a single terminator
- Issue #3419 - When using the router data model, precedence specified on the per-service identity mapping are incorrectly interpreted
- Issue #3277 - Router can deadlock on closing a connection if the incoming data channel is full
v1.5.9
Release 1.5.9
What's New
This release syncs the packaging and docker code with the latest from main
v1.1.20
Release 1.1.20
What's New
This release sync the 1.1 branch with the package and docker build code from main
v1.8.0-pre2
Release v1.8.0-pre2