-
Notifications
You must be signed in to change notification settings - Fork 1
allow outways based on domain name #53
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
TheBonheurs
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should we also add relevant test cases for this functionality (in the test-suite)?
specifications.md
Outdated
| 1. The Manager is provided by a Peer who has an Inway which is offering the Service specified in `grant.data.service.name`. | ||
| 1. The Peer ID specified by the X.509 certificate of the client requesting the access token matches the value of the field `grant.data.outway.peer_id`. | ||
| 1. The X.509 certificate provided by the client contains the same public key as specified in `grant.data.outway.public_key_fingerprint` | ||
| 1. The X.509 certificate provided by the client contains a public key with the same public key thumbprint as specified in `grant.data.outway.public_key_thumbprint`. This validation should only be preformed when the value of `grant.outway.type` equals `OUTWAY_TYPE_PUBLIC_KEY_THUMBPRINT` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| 1. The X.509 certificate provided by the client contains a public key with the same public key thumbprint as specified in `grant.data.outway.public_key_thumbprint`. This validation should only be preformed when the value of `grant.outway.type` equals `OUTWAY_TYPE_PUBLIC_KEY_THUMBPRINT` | |
| 1. The X.509 certificate provided by the client contains a public key with the same public key thumbprint as specified in `grant.data.outway.public_key_thumbprint`. This validation should only be performed when the value of `grant.outway.type` equals `OUTWAY_TYPE_PUBLIC_KEY_THUMBPRINT` |
specifications.md
Outdated
| 1. The Peer ID specified by the X.509 certificate of the client requesting the access token matches the value of the field `grant.data.outway.peer_id`. | ||
| 1. The X.509 certificate provided by the client contains the same public key as specified in `grant.data.outway.public_key_fingerprint` | ||
| 1. The X.509 certificate provided by the client contains a public key with the same public key thumbprint as specified in `grant.data.outway.public_key_thumbprint`. This validation should only be preformed when the value of `grant.outway.type` equals `OUTWAY_TYPE_PUBLIC_KEY_THUMBPRINT` | ||
| 1. The X.509 certificate provided by the client has a Subject Alternative Name(SAN) that matches the domain name specified in `grant.data.outway.domain_name`. This validation should only be preformed when the value of `grant.outway.type` equals `OUTWAY_TYPE_DOMAIN_NAME` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| 1. The X.509 certificate provided by the client has a Subject Alternative Name(SAN) that matches the domain name specified in `grant.data.outway.domain_name`. This validation should only be preformed when the value of `grant.outway.type` equals `OUTWAY_TYPE_DOMAIN_NAME` | |
| 1. The X.509 certificate provided by the client has a Subject Alternative Name (SAN) that matches the domain name specified in `grant.data.outway.domain_name`. This validation should only be preformed when the value of `grant.outway.type` equals `OUTWAY_TYPE_DOMAIN_NAME` |
media/specs/manager.yaml
Outdated
| - peer_id | ||
| - public_key_thumbprint | ||
| outwayDomainName: | ||
| description: The details of the Outway based on a domain name for which a connection authorization was granted |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| description: The details of the Outway based on a domain name for which a connection authorization was granted | |
| description: The details of the Outway based on a domain name for which a connection was authorized |
I think this flows better but only if 'connection authorization' is not a defined term already.
377e21d to
e5fb932
Compare
In a (Delegated) Service Connection Grant an Outway can be specified based on domain name. Previously only a public key thumbprint was allowed. An Outway must have the domain name specified as a Subject Alternative Name in its certificate to be allowed to request an access token. By allowing domain names Contracts won't have to be renewed when the Outway renews its certificate and rotates its keypair.
e5fb932 to
6363e56
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
An example using a domain name is missing
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Discussed this with @ronaldkoster and concluded that adding an example is not needed. The referenced lines already show a Contract with a ServiceConnectionGrant, and there are no defined examples for OutwayIdentificationType in the standard beyond descriptive guidance. Adding such examples would also raise the question of adding examples for other types (e.g., ServiceTypes).
We'll have to discuss this in a future release.
Co-authored-by: Niels Dequeker <niels@dqkr.be>
In a (Delegated) Service Connection Grant an Outway can be specified based on domain name. Previously only a public key thumbprint was allowed. An Outway must have the domain name specified as a Subject Alternative Name in its certificate to be allowed to request an access token. By allowing domain names Contracts won't have to be renewed when the Outway renews its certificate and rotates its keypair.