Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for OAuth2 client-credentials flow #107

Open
ro-poletti-reply opened this issue Jan 10, 2025 · 0 comments
Open

Add support for OAuth2 client-credentials flow #107

ro-poletti-reply opened this issue Jan 10, 2025 · 0 comments

Comments

@ro-poletti-reply
Copy link

The current implementation makes the assumption that the authorization code flow is in use.

My feature request is integrating OAuth2 client-credentials flow to achieve machine-to-machine communications. The idea would be to replicate what has already been done for OIDC: standard implementation, caching features shared across HA NGINX instances (please, see the end of this description) and suggested advanced NGINX settings out of the box. This means having a standardized implementation of RFC6749 for the above-mentioned grant-type (i.e. client-credentials), where NGINX Plus is configured as a relying party.

In the given scenario, the use-case is therefore the following:

The client_id and client_secret are inserted by the client application in the request payload and submitted to NGINX for the purposes of requesting a new access token. Caching of the access token is done by the application itself, which requires NGINX to issue a new token when the old one expires in the application internal cache. Either way, NGINX might cache the access token too if you deem it necessary.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant