-
Notifications
You must be signed in to change notification settings - Fork 945
[main] Allow CF Authentication based on Tokens - user and client tokens #3397
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Used for testing UAA changes with token exchanges, e.g. cloudfoundry/cli#3397
Used for testing UAA changes with token exchanges, e.g. cloudfoundry/cli#3397
Used for testing UAA changes with token exchanges, e.g. cloudfoundry/cli#3397
@a-b Can you give me a timeline about when somebody checks the PR ? There is one failing test but I dont see a relation to my changes. The extension is for https://github.com/cloudfoundry/community/blob/main/toc/rfc/rfc-0037-deprecate-passwords.md#cf-cli I will provide PRs for the other repos and also for cf login after that but first I would like to know if you accept this enhancments Thanks in advance |
Hi. I'll look into this shortly. |
We are currently only releasing from the v8 branch. @strehle, are you planning to create a PR for v8? |
Yes v7 is out of support. |
Note: Please create separate PR for every branch (main, v8 and v7) as needed.
Description of the Change
Enhance the cf auth command with a parameter --assertion. The content of this token should be either a user token in order to perform a jwt-bearer or a client token in order to perform a client_credentials grant with federated trust.
UAA supports JWT bearer since UAA 4.5.0 , see https://docs.cloudfoundry.org/api/uaa/version/77.25.0/index.html#jwt-bearer-token-grant
UAA support the federated client credential flow since 77.25.0
Why Is This PR Valuable?
CF can be integrated into Github Action without any extra secret setup in Github Repo.
Customer can then decide about using external tokens like github action token for user and/or client authentication.
In a PR you retrieve a id_token from gh action, this can be passed with cf auth --assertion so that you are authentication in or to do a cf push ...
Applicable Issues
How Urgent Is The Change?
Other Relevant Parties
Only CF landscapes with a configured trust to external OIDC parties