-
-
Notifications
You must be signed in to change notification settings - Fork 417
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow to customize result header name #241
Comments
👍 I agree, it would be trivial to add a config option for this. For the second point, what provider are you using? |
I'm using keycloak and it provides multiple identifying attributes in the authentication token. There is a unique id (UUID), the user's mail address, the user name and/or probably configured custom attributes. Depending on the application that is to be secured, any of these values might be of interest |
As an example, I am testing letting users log into a Trac installation with their Keycloak account. Currently, I have to do some hackery like this in the nginx conf:
which of course only works because the username matches the local part of their email addresses. #159 is related, isn't it? |
My usecase is integrating rundeck in preauthenticated mode: https://docs.rundeck.com/docs/administration/security/authentication.html#preauthenticated-mode I found this non-merged PR in one of the many forks of traefik-forward-auth that is related to this feature: mesosphere/traefik-forward-auth#72 |
@monsdar I just want to be sure that we are aligned What @skuzzle is trying to do here is to just change the header name from being This is already possible with mesosphere's (probably unmaintained now?) fork with the Instead, the PR I proposed to mesosphere's fork you mention, is about adding any number of headers to the request taking the values from the authentication claims. So, we have two paths, according to me:
Given the above, and the fact that the last commit to this repository is 3 years old, if nothing changes, I would highly recommend going with the mesosphere's fork that already has |
You are right. The issue is about renaming |
Not all applications I came along support the
X-Forwarded-User
header. It would be great if the result header name could be configured to also support those applications.To drive this further, it would be great if the claim name from which the header's value is taken were also be customizable.
The text was updated successfully, but these errors were encountered: