[ https://issues.apache.org/jira/browse/CAMEL-21383?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Christoph Deppisch updated CAMEL-21383: --------------------------------------- Description: The Knative eventing broker may use OIDC (OpenID Connect) as an authorization protocol. Clients need to use the respective tokens to authenticate via Https when connecting to the Knative broker in order to produce events. OpenID Connect (OIDC) is an identity authentication protocol that works with OAuth 2.0 to standardize the process for authenticating and authorizing users. Knative eventing supports OIDC access tokens that get injected as part of a SinkBinding resource. The injection is done in the form of a volume mount on the sink binding subject (usually the app deployment). This means the OIDC access token is mounted as a file into the application container so Camel client may read the token and set proper Authorization Http headers on each request. The OIDC tokens may expire and get renewed by Knative eventing. The renewal means that the volume mount is updated with the new token automatically. In order to refresh the token the Camel Knative client must read the token again. The Knative client options supports the token renewal on a `401 forbidden` response from the Knative broker. Once the client has received the forbidden answer it automatically reloads the token from the volume mount to perform the renewal. As an alternative to that you may disable the token cache on the client so the token is always read from the volume mount for each request. was:The Knative eventing broker may use OIDC (OpenID Connect) as an authorization protocol. Clients need to use the respective tokens to authenticate via Https when connecting to the Knative broker in order to produce events. > Add OIDC support for Knative Http client > ---------------------------------------- > > Key: CAMEL-21383 > URL: https://issues.apache.org/jira/browse/CAMEL-21383 > Project: Camel > Issue Type: Improvement > Components: camel-knative-http > Reporter: Christoph Deppisch > Priority: Major > Fix For: 4.9.0 > > > The Knative eventing broker may use OIDC (OpenID Connect) as an authorization > protocol. Clients need to use the respective tokens to authenticate via Https > when connecting to the Knative broker in order to produce events. > > OpenID Connect (OIDC) is an identity authentication protocol that works with > OAuth 2.0 to standardize the process for authenticating and authorizing users. > Knative eventing supports OIDC access tokens that get injected as part of a > SinkBinding resource. The injection is done in the form of a volume mount on > the sink binding subject (usually the app deployment). This means the OIDC > access token is mounted as a file into the application container so Camel > client may read the token and set proper Authorization Http headers on each > request. > > The OIDC tokens may expire and get renewed by Knative eventing. The renewal > means that the volume mount is updated with the new token automatically. > In order to refresh the token the Camel Knative client must read the token > again. The Knative client options supports the token renewal on a `401 > forbidden` response from the Knative broker. Once the client has received the > forbidden answer it automatically reloads the token from the volume mount to > perform the renewal. > > As an alternative to that you may disable the token cache on the client so > the token is always read from the volume mount for each request. -- This message was sent by Atlassian Jira (v8.20.10#820010)