-
Bug
-
Resolution: Done
-
Blocker
-
7.1.0.CR1
-
-
-
-
-
-
+
As part of EAP7-284, Elytron was designed for and contains implementation to support trusted use of identities between peers in addition to credential forwarding. Cases in which one would prefer this approach include:
- Scenarios where the user has requirements to not send passwords over the wire. Notably credential forwarding requires TLS and/or secure networks
- Setups where an authentication type that does not support credential forwarding are used (credential forwarding is limited to Plain, Form, and OAuth, all other mechanisms, including the out of the box Digest auth of EAP are not)
- Environments where its desired to limit which systems are allowed to receive requests which are propagated
Due to an oversight this capability was not properly wired to the server configuration (nor a config method on the Elytron API).
- is blocked by
-
WFCORE-3267 Authorization identity forwarding not exposed to configuration
- Resolved
-
ELY-1077 Allow AuthenticationConfiguration identity forwarding to populate authorization-id instead of authentication name
- Resolved
- is incorporated by
-
JBEAP-12930 Upgrade WildFly Elytron to 1.1.2.Final
- Closed
- relates to
-
JBEAP-7220 [DOC RFE] Client / Server Security Context Propagation for Remoting and Running As a given user
- Closed
- links to