Cert-bound access tokens without client secret or IDv1.0+

Configure the OpenID Connect plugin to use certificate-bound access tokens without a client secret or ID. Instead, you can use the TLS Handshake Modifier plugin to request a client certificate and make it available to the OpenID Connect plugin.

The OIDC plugin will validate and use the provided certificates to authenticate with your IdP and retrieve a bearer token.

Prerequisites

  • The TLS Handshake Modifier plugin is configured to request client certificates from your IdP

  • An identity provider (IdP) configured with mTLS and X.509 client certificate authentication

Environment variables

  • ISSUER: The well-known issuer endpoint of your IdP, for example http://keycloak.test:8080/realms/master.

Set up the plugin

Help us make these docs great!

Kong Developer docs are open source. If you find these useful and want to make them better, contribute today!