Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disable /login path for roles with role_type oidc #38

Merged
merged 1 commit into from
Apr 4, 2019

Conversation

bks7
Copy link

@bks7 bks7 commented Apr 4, 2019

Vault must not accept signed JWT tokens through /login path when role
has role_type oidc, since there might be a situation when the client
secret could be compromised, and thus the malicious might be able to
illegitimately get a token with the right aud claim, which Vault would
accept through the /login path.

Vault must not accept signed JWT tokens through /login path when role
has role_type oidc, since there might be a situation when the client
secret could be compromised, and thus the malicious might be able to
illegitimately get a token with the right aud claim, which Vault would
accept through the /login path.
@hashicorp-cla
Copy link

hashicorp-cla commented Apr 4, 2019

CLA assistant check
All committers have signed the CLA.

@kalafut kalafut self-assigned this Apr 4, 2019
@kalafut
Copy link
Contributor

kalafut commented Apr 4, 2019

@bks7 Thanks for the PR. I think your suggestion makes sense. The current approach was in support of a Kubernetes use case that isn't needed at this point, so removing this ability is fine. I plan to get to the review soon.

@kalafut kalafut merged commit 7ca4cef into hashicorp:master Apr 4, 2019
@kalafut
Copy link
Contributor

kalafut commented Apr 4, 2019

Thanks!

kalafut pushed a commit that referenced this pull request Jun 18, 2019
This check was inadvertently removed for OIDC roles in
#38
@kalafut kalafut mentioned this pull request Jun 18, 2019
kalafut pushed a commit that referenced this pull request Jun 18, 2019
This check was incorrectly removed for OIDC roles in #38
@wouterh-dev wouterh-dev mentioned this pull request Aug 30, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants