Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OIDC authentication support #170

Open
jorhett opened this issue Jan 27, 2022 · 2 comments
Open

OIDC authentication support #170

jorhett opened this issue Jan 27, 2022 · 2 comments
Labels
enhancement New feature or request triage

Comments

@jorhett
Copy link

jorhett commented Jan 27, 2022

Terraform Version

1.1.4

Affected Resource(s)

boundary provider

Terraform Configuration Files

N/A

Expected Behavior

Terraform user should be able to authenticate with OIDC

Actual Behavior

It's currently required to add password auth and a static username/password to a Boundary implementation which is 100% OIDC-driven. It would be much better to remove the existence of this static secret.

@jorhett
Copy link
Author

jorhett commented Jan 27, 2022

Perhaps this is indirectly supported by the token env variable, and just needs to be documented as such?

token (String) The Boundary token to use, as a string or path on disk containing just the string. If set, the token read here will be used in place of authenticating with the auth method specified in "auth_method_id", although the recovery KMS mechanism will still override this. Can also be set with the BOUNDARY_TOKEN environment variable.

@sswati0 sswati0 added the triage label May 31, 2022
@covetocove
Copy link

Hi @jorhett, direct OIDC authentication is something we'd like to add to our Terraform Provider but there are a number of workarounds in the meantime:

  • Adding a un/pw method, but as you pointed out this limits your environment to not being 100% OIDC driven.
  • Passing a valid Boundary token to the provider after OIDC authentication, which you can read more about here. As part of OIDC authentication, a client's OIDC JWT token will be exchanged for a Boundary token which can be passed to the provider via the token field or via the BOUNDARY_TOKEN environment variable. You can access auth tokens via the CLI with boundary auth-tokens read

@covetocove covetocove added the enhancement New feature or request label Jun 27, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request triage
Projects
None yet
Development

No branches or pull requests

3 participants