mirror of
https://github.com/hashicorp/vault.git
synced 2026-02-15 12:51:58 +01:00
Update Docs For Bound Audience Explanation (#30519)
* update docs for more clarity around bound audiences * more updates * update changelog * Delete changelog/30519.txt * Update website/content/docs/auth/jwt/index.mdx Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com> * Update website/content/api-docs/auth/jwt.mdx Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com> --------- Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
This commit is contained in:
parent
a82d6192aa
commit
1face9d8cf
@ -112,8 +112,9 @@ entities attempting to login. At least one of the bound values must be set.
|
||||
- `name` `(string: <required>)` - Name of the role.
|
||||
- `role_type` `(string: <optional>)` - Type of role, either "oidc" (default) or "jwt".
|
||||
- `bound_audiences` `(array: <optional>)` - List of `aud` claims to match against.
|
||||
Any match is sufficient. Required for "jwt" roles if the JWT has an `aud`
|
||||
claim. Optional for "oidc" roles.
|
||||
The `bound_audiences` parameter is required for "jwt" roles that contain an
|
||||
audience (typical case) and **must** match at least one of the associated JWT
|
||||
`aud` claims.
|
||||
- `user_claim` `(string: <required>)` - The claim to use to uniquely identify
|
||||
the user; this will be used as the name for the Identity entity alias created
|
||||
due to a successful login. The claim value must be a string.
|
||||
|
||||
@ -10,8 +10,9 @@ description: >-
|
||||
@include 'x509-sha1-deprecation.mdx'
|
||||
|
||||
~> **Note**: Starting in Vault 1.17, if the JWT in the authentication request
|
||||
contains an `aud` claim, the associated `bound_audiences` for the "jwt" role
|
||||
must match at least one of the `aud` claims declared for the JWT. For
|
||||
contains an `aud` claim (typical case) the associated `bound_audiences` for the
|
||||
"jwt" role must **exactly** match at least one of the `aud` claims declared for
|
||||
the JWT. For
|
||||
additional details, refer to the [JWT auth method (API)](/vault/api-docs/auth/jwt)
|
||||
documentation and [1.17 Upgrade Guide](/vault/docs/upgrading/upgrade-to-1.17.x#jwt-auth-login-requires-bound-audiences-on-the-role).
|
||||
|
||||
@ -214,7 +215,7 @@ backend instance per method at different paths.
|
||||
After verifying the JWT signatures, Vault checks the corresponding `aud` claim.
|
||||
|
||||
If the JWT in the authentication request contains an `aud` claim, the
|
||||
associated `bound_audiences` for the role must match at least one of the `aud`
|
||||
associated `bound_audiences` for the role must **exactly** match at least one of the `aud`
|
||||
claims declared for the JWT.
|
||||
|
||||
### Via the CLI
|
||||
@ -324,7 +325,7 @@ In some cases there are dedicated parameters, for example `bound_subject`,
|
||||
that must match the provided `sub` claim. For roles of type "jwt":
|
||||
|
||||
1. the `bound_audiences` parameter is required when an `aud` claim is set.
|
||||
1. the `bound_audiences` parameter must match at least one of provided `aud` claims.
|
||||
1. the `bound_audiences` parameter must **exactly** match at least one of provided `aud` claims.
|
||||
|
||||
You can also configure roles to check an arbitrary set of claims and required
|
||||
values with the `bound_claims` map. For example, assume `bound_claims` is set to:
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user