https://github.com/optum/kong-upstream-jwt
A plugin for Kong which adds a signed JWT to HTTP Headers to backend requests
https://github.com/optum/kong-upstream-jwt
api-gateway kong optum
Last synced: 6 months ago
JSON representation
A plugin for Kong which adds a signed JWT to HTTP Headers to backend requests
- Host: GitHub
- URL: https://github.com/optum/kong-upstream-jwt
- Owner: Optum
- License: apache-2.0
- Created: 2018-01-18T18:23:34.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2023-08-10T03:31:14.000Z (about 2 years ago)
- Last Synced: 2025-04-14T15:22:06.848Z (6 months ago)
- Topics: api-gateway, kong, optum
- Language: Lua
- Homepage:
- Size: 1.08 MB
- Stars: 46
- Watchers: 13
- Forks: 23
- Open Issues: 10
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
Awesome Lists containing this project
README
# Kong Upstream JWT Plugin
## Overview
This plugin will add a signed JWT into the HTTP Header `JWT` or `config.header` of proxied requests through the Kong gateway. The purpose of this, is to provide means of _Authentication_, _Authorization_ and _Non-Repudiation_ to API providers (APIs for which Kong is a gateway).In short, API Providers need a means of cryptographically validating that requests they receive were A. proxied by Kong, and B. not tampered with during transmission from Kong -> API Provider. This token accomplishes both as follows:
1. **Authentication** & **Authorization** - Provided by means of JWT signature validation. The API Provider will validate the signature on the JWT token (which is generating using Kong's RSA x509 private key), using Kong's public key. This public key can be maintained in a keystore, or sent with the token - provided API providers validate the signature chain against their truststore.
2. **Non-Repudiation** - SHA256 is used to hash the body of the HTTP Request Body, and the resulting digest is included in the `payloadhash` element of the JWT body. API Providers will take the SHA256 hash of the HTTP Request Body, and compare the digest to that found in the JWT. If they are identical, the request remained intact during transmission.## Supported Kong Releases
Kong >= 3.x## Installation
Recommended:
```
$ luarocks install kong-upstream-jwt
```
Other:
```
$ git clone https://github.com/Optum/kong-upstream-jwt.git /path/to/kong/plugins/kong-upstream-jwt
$ cd /path/to/kong/plugins/kong-upstream-jwt
$ luarocks make *.rockspec
```## JWT Token
The following is an example of the contents of the decoded JWT token:**Header:**
```json
{
"x5c": ["...der-encoded cert data..."],
"alg": "RS256",
"typ": "JWT",
"kid": "..conf.key_id.." // Only present if conf.key_id configuration variable set
}
```**Payload:**
```json
{
"aud": "kong-service-name", // The Kong Service Name
"iss": "issuer", // Only set if issuer configuration variable available
"iat": 1550258274, // Only set if issuer configuration variable available
"exp": 1550258334, // 1 minute exp time
"jti": "d4f10edb-c4f0-47d3-b7e0-90a30a885a0b", // Unique to every request - UUID
"consumername": "consumer-username", // Consumer Username
"consumerid": "consumer-id", // Consumer ID
"payloadhash": "...sha256 hash of request payload..."
}
```## Configuration
### Private and Public Keys
The plugin requires that Kong's private key be accessible in order to sign the JWT. [We also include the x509 cert in the `x5c` JWT Header for use by API providers to validate the JWT](https://tools.ietf.org/html/rfc7515#section-4.1.6).### JWT Issuer
[JWT Issuer](https://tools.ietf.org/html/rfc7519#section-4.1.1) allows for the `iss` field to be set within the `JWT` token.More information about JWT claims can be found [here](https://tools.ietf.org/html/rfc7519#section-4)
**Optional Plugin schema configurations:**
```
private_key_location = "/path/to/kong/ssl/privatekey.key"
public_key_location = "/path/to/kong/ssl/kongpublickey.cer"
issuer = "issuer"
key_id = "keyId"
header = "JWT" //If you want to set the header key to something other than JWT
include_credential_type = false //Controls "Bearer " + JWT or just JWT in header
```The first contains the path to your .key file, the second specifies the path to your public key in DER format .cer file.
#### Backwards Compatibility
To maintain backwards compatibility, support for passing the key locations through environment variables is also available. We access these via Kong's overriding environment variables `KONG_SSL_CERT_KEY` for the private key as well as `KONG_SSL_CERT_DER` for the public key.**If not already set, these can be done so as follows:**
```
$ export KONG_SSL_CERT_KEY="/path/to/kong/ssl/privatekey.key"
$ export KONG_SSL_CERT_DER="/path/to/kong/ssl/kongpublickey.cer"
```**One last step** is to make the environment variables accessible by an nginx worker. To do this, simply add these line to your _nginx.conf_
```
env KONG_SSL_CERT_KEY;
env KONG_SSL_CERT_DER;
```## Maintainers
[jeremyjpj0916](https://github.com/jeremyjpj0916)
[rsbrisci](https://github.com/rsbrisci)Feel free to open issues, or refer to our [Contribution Guidelines](https://github.com/Optum/kong-upstream-jwt/blob/master/CONTRIBUTING.md) if you have any questions.