Configure OpenID Connect with claims-based authorization

Uses: Kong Gateway decK
TL;DR

Use the OpenID Connect plugin to look for specific claims in a token payload, and only allow users with the right claims access to a given resources.

Set up any type of authentication (the password grant, in this guide) and enable claims-based authorization by pointing to claims to look for in the authorization request.

Prerequisites

This is a Konnect tutorial. If you don’t have a Konnect account, you can get started quickly with our onboarding wizard.

  1. The following Konnect items are required to complete this tutorial:

    • Personal access token (PAT): Create a new personal access token by opening the Konnect PAT page and selecting Generate Token.
    • Control Plane Name: You can use an existing Control Plane or create a new one to use for this tutorial.
    • Konnect Proxy URL: By default, a self-hosted Data Plane uses http://localhost:8000. You can set up Data Plane nodes for your Control Plane from the Gateway Manager in Konnect.
  2. Set the personal access token, the Control Plane name, the Control Plane URL, and the Konnect proxy URL as environment variables:

     export DECK_KONNECT_TOKEN='YOUR KONNECT TOKEN'
     export DECK_KONNECT_CONTROL_PLANE_NAME='YOUR CONTROL PLANE NAME'
     export KONNECT_CONTROL_PLANE_URL=https://us.api.konghq.com
     export KONNECT_PROXY_URL='KONNECT PROXY URL'
    

This tutorial requires Kong Gateway Enterprise. If you don’t have Kong Gateway set up yet, you can use the quickstart script with an enterprise license to get an instance of Kong Gateway running almost instantly.

  1. Export your license to an environment variable:

     export KONG_LICENSE_DATA='LICENSE-CONTENTS-GO-HERE'
    
  2. Run the quickstart script:

     curl -Ls https://get.konghq.com/quickstart | bash -s -- -e KONG_LICENSE_DATA 
    

    Once Kong Gateway is ready, you will see the following message:

     Kong Gateway Ready
    

decK is a CLI tool for managing Kong Gateway declaratively with state files. To complete this tutorial you will first need to install decK.

For this tutorial, you’ll need Kong Gateway entities, like Gateway Services and Routes, pre-configured. These entities are essential for Kong Gateway to function but installing them isn’t the focus of this guide. Follow these steps to pre-configure them:

  1. Run the following command:

    echo '
    _format_version: "3.0"
    services:
      - name: example-service
        url: http://httpbin.konghq.com/anything
    routes:
      - name: example-route
        paths:
        - "/anything"
        service:
          name: example-service
    ' | deck gateway apply -
    

To learn more about entities, you can read our entities documentation.

This tutorial requires an identity provider (IdP). If you don’t have one, you can use Keycloak. The steps will be similar in other standard identity providers.

Create a client

  1. Install Keycloak (version 26 or later) on your platform.

    For example, you can use the Keycloak Docker image:

     docker run -p 8080:8080 \
       -e KC_BOOTSTRAP_ADMIN_USERNAME=admin \
       -e KC_BOOTSTRAP_ADMIN_PASSWORD=admin \
       quay.io/keycloak/keycloak start-dev
    
  2. Open the admin console.

    The default URL of the console is http://$YOUR_KEYCLOAK_HOST:8080/admin/master/console/.

  3. In the sidebar, open Clients, then click Create client.
  4. Configure the client:

Section

Settings

General settings
  • Client type: OpenID Connect
  • Client ID: any unique name, for example kong
Capability config
  • Toggle Client authentication to on
  • Make sure that Standard flow, Direct access grants, and Service accounts roles are checked.
Login settings Valid redirect URIs: http://localhost:8000/*

Set up keys and credentials

  1. In your client, open the Credentials tab.
  2. Set Client Authenticator to Client ID and Secret.
  3. Copy the Client Secret.
  4. Switch to the Users menu and add a user.
  5. Open the user’s Credentials tab and add a password. Be sure to disable Temporary Password.

In this guide, we’re going to use an example user named alex with the password doe.

Export to environment variables

Export your client secret, client ID, and issuer URL to environment variables so that you can pass them more securely. For example:

export DECK_ISSUER=http://host.docker.internal:8080/realms/master
export DECK_CLIENT_ID=kong
export DECK_CLIENT_SECRET=UNT3GPzCKI7zUbhAmFSUGbj4wmiBDGiW

Enable the OpenID Connect plugin with claims-based authorization

Using the Keycloak and Kong Gateway configuration from the prerequisites, set up an instance of the OpenID Connect plugin. In this example, we’re using the simple password grant with the scopes_claim and scopes_required claims pair.

Enable the OpenID Connect plugin on the example-service Service:

echo '
_format_version: "3.0"
plugins:
  - name: openid-connect
    service: example-service
    config:
      issuer: "${{ env "DECK_ISSUER" }}"
      client_id:
      - "${{ env "DECK_CLIENT_ID" }}"
      client_secret:
      - "${{ env "DECK_CLIENT_SECRET" }}"
      client_auth:
      - client_secret_post
      auth_methods:
      - password
      - bearer
      scopes_claim:
      - scope
      scopes_required:
      - openid
' | deck gateway apply -

In this example:

  • issuer, client ID, client secret, and client auth: Settings that connect the plugin to your IdP (in this case, the sample Keycloak app).
  • auth_methods: Password grant, for easy testing, and the bearer grant so that we can authenticate using the JWT that we retrieve.
  • scopes_claim and scopes_required: Looks for a claim named scope in the payload, and checks that the scope contains openid.

Note: Setting config.client_auth to client_secret_post lets you easily test the connection to your IdP, but we recommend using a more secure auth method in production. You can use any of the supported client auth methods.

Retrieve the bearer token

Check that you can recover the token by requesting the Service with the basic authentication credentials created in the prerequisites:

curl -i -X GET "$KONNECT_PROXY_URL/anything" \
     -u alex:doe
curl -i -X GET "http://localhost:8000/anything" \
     -u alex:doe

You’ll see an Authorization header in the response.

Export the value of the header to an environment variable:

export TOKEN=YOUR_BEARER_TOKEN

Validate the token

Now, validate the setup by accessing the example-route Route and passing the token from the previous step:

curl -i -X GET "$KONNECT_PROXY_URL/anything" \
     -H "Authorization: $TOKEN"
curl -i -X GET "http://localhost:8000/anything" \
     -H "Authorization: $TOKEN"

If Kong Gateway successfully authenticates with Keycloak, you’ll see a 200 response with your bearer token in the Authorization header.

If you make another request using the same credentials, you’ll see that Kong Gateway adds less latency to the request because it has cached the token endpoint call to Keycloak:

X-Kong-Proxy-Latency: 25

Cleanup

If you created a new control plane and want to conserve your free trial credits or avoid unnecessary charges, delete the new control plane used in this tutorial.

curl -Ls https://get.konghq.com/quickstart | bash -s -- -d

FAQs

For troubleshooting or debugging purposes, you may want to check the scopes being passed in the payload. The signed JWT access token you receive in the response is composed of three parts, each separated with a dot (.) character: $HEADER.$PAYLOAD.$SIGNATURE. The payload portion contains the scopes information, encoded in base64 format.

Decode the payload in any tool you prefer. For example, you can use base64 and jq:

jq -n --arg p "$PAYLOAD" '$p | @base64d | fromjson'

The response will contain data about the user, including the scope:

"scope": "openid profile email",
"email_verified": false,
"preferred_username": "alex"

If you’re running a self-managed Kong Gateway instance, you can check that the OpenID connect plugin is able to access the issuer URL with the /openid-connect/issuers/ endpoint:

curl http://localhost:8001/openid-connect/issuers

The results should contain the Keycloak OpenID Connect discovery document and keys. If the results only show the issuer URL and ID, then the connection was unsuccessful.

Something wrong?

Help us make these docs great!

Kong Developer docs are open source. If you find these useful and want to make them better, contribute today!