Replies: 1 comment
-
We do look at some of these things from time to time. We are less inclined to introduce new dependencies however like SPIFFE or DPoP. However, we designed an implemented a full zero-trust auth-callout mechanism that instructs a server to delegate authN and authZ to an external service. This might be what you would want. https://github.com/nats-io/nats-architecture-and-design/blob/main/adr/ADR-26.md And an example. https://natsbyexample.com/examples/auth/callout/cli |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi, I've been spending quite some time exploring the different auth methods for NATS.
I'm specifically interested in two use cases:
So my first question: Is there any recommendations/best practise for the above scenarios, especially the first one. Would this be better suited to client certs or the NKEY/JWT pattern?
Are there any plans to leverage SPIFFE as an additional Auth capability in NATS ?
Finally, any thoughts on enabling NATS to support DPoP (OAuth 2.0 Demonstrating Proof-of-Possession at the Application Layer) or similar ? https://datatracker.ietf.org/doc/html/draft-ietf-oauth-dpop#name-dpop-proof-jwt-syntax
Beta Was this translation helpful? Give feedback.
All reactions