You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Apr 22, 2024. It is now read-only.
In the original issue, I see they create an additional field for the trusted CA inside the JWKS settings.
I guess it is safe to just use the existing one in the OIDC config? In the end all endpoints should be exposed by the same IdP
I think it can use the existing one. The main problem is that the original authservice doesn't pass the configured CA trust when making HTTP GET calls.
bigbang implemented a workaround for this by setting SSL_CERTFILE env variable pointing to trust bundle https://repo1.dso.mil/big-bang/product/packages/authservice/-/merge_requests/116
original PR istio-ecosystem/authservice#235
This has been requested by P1
The text was updated successfully, but these errors were encountered: