Azure / data-api-builder

Data API builder provides modern REST and GraphQL endpoints to your Azure Databases and on-prem stores.
https://aka.ms/dab/docs
MIT License
934 stars 194 forks source link

[Feature]: Support OpenId Connect Identity Provider #2226

Open raffaeler opened 5 months ago

raffaeler commented 5 months ago

Feature request

I see from the tests and from this issue that DAB already supports JWT authentication and authorization, but I was not able to find any configuration detail for that.

This is a feature request requiring two consecutive steps:

  1. Provide documentation on how to specify the client secret and the other configuration details to spend a JWT token created by an external Identity Provider
  2. Provide extended support for OpenId Connect standard (which is well supported in .NET) so that all the configuration details can be inherited from the metadata endpoint of the Identity Provider supporting OpenId Connect.

The ultimate goal is to make DAB nicely play with Keycloak Identity Provider in container. Keycloak supports federation to external Identity Providers and allows to transform the claimset coming from external IPs making easier to add any cloud provider like Microsoft, Cognito, Google, GitHub, etc.

Version

1.1.7

What database are you using?

Azure SQL

What hosting model are you using?

Local (including CLI), Custom Docker host

Which API approach are you accessing DAB through?

REST, GraphQL

Relevant log output

No response

Code of Conduct

seantleonard commented 5 months ago

Thank you for your feedback, @raffaeler

Can you provide more details about the end-to-end workflow you want DAB to support?

{
  "runtime": {
    "host": {
      "authentication": {
        "jwt": {
          "audience": "<string>",
          "issuer": "<string>"
        }
      }
    }
  }
}
raffaeler commented 5 months ago

Thanks for your answer @seantleonard

For the first step, I just need to validate the JWT. I already knew the web page you linked but I am not familiar with Azure Static Web Apps. I recognize the "runtime", "host" and "authentication" sections but I am not sure where I should save the config file when I run dab (or when starting it in a container). In traditional asp.net core apps, when I configure the webapi to use JWT auth, I usually use the client secret to validate the token. Let me understand this other flow please.

For the step 2, I need to authenticate the developer accessing the data interactively. This includes the swagger and graphql pages. In this case, the OpenId Connect support would open to any modern IP. Just to be clear, I don't want dab to directly redirect to external providers like Microsoft, Cognito, Google and GitHub. I need to pass through Keycloak because it gives me the ability to "refactor" the claims which are different on each provider. It also gives me the ability to use KC APIs for administrative purposes and much more.

Thanks

rodwin commented 5 months ago

I am exactly looking for the same information on how to integrate other identity provider like keycloak

raffaeler commented 5 months ago

@seantleonard Could you please tell me whether point 1 of my original message is already doable? I don't see any mention in the code to the client secret to make DAB decode the JWT and evaluate the claims. Thanks!

theo-auffeuvre commented 1 month ago

I am very interessed about this feature too ! (@raffaeler did you find a work around ?)

raffaeler commented 1 month ago

@theo-auffeuvre unfortunately not and unfortunately this is one of the two issues that blocked us to use this great tool