-
Notifications
You must be signed in to change notification settings - Fork 414
Closed
Labels
kind/documentationCategorizes issue or PR as related to documentation.Categorizes issue or PR as related to documentation.
Description
Feature Description
Imagine a situation:
- Single kcp instance with OIDC provider connected to it.
- Many vendors/companies use the same instance with their own UI/CLI tooling.
I want to be able to do a few things:
Based on user attributes (group or scope) in jwt token from oidc provider to grant access to APIExports. Potentially with configurable behaviour like "FilterOut" or "Deny", where multiple could be provided.
Bonus: kcp could expose possible "scopes" as a separate API (similar as .well-known file in oidc)
Proposed Solution
- Extend kcp to be jwt attributes aware
- Add scoping (potentially to warrants machinery)
Alternative Solutions
No response
Want to contribute?
- I would like to work on this issue.
Additional Context
No response
Metadata
Metadata
Assignees
Labels
kind/documentationCategorizes issue or PR as related to documentation.Categorizes issue or PR as related to documentation.
Type
Projects
Status
Done