Hi all,
Microgateway 3.0.x versions support for opaque oauth2 token are tightly
bound with APIM key manager component. Right now it validates token using
the key validation service of APIM, which does the token validation, scope
validation, subscription validation (and back end jwt generation if
enabled).

We will need to provide a way to plug microgateway with an oauth2 server
with standard introspect endpoint for token validation. Following
limitations would incur due to the usage of standard introspection.

1. Subscription validation can not be enforced.
2. Rate limiting using application level throttling
3. Rate limiting using subscription level throttling
4. Completeness of analytics dashboard data

These are the same limitations, we have when we use a self contains jwt
token from a third party key manager(STS).

The key manager configuration of the microgateway is below[1]. We can add
an additional parameter[2] to specify to use an external key manager
instead of the WSO2 key manager.

Please share your thoughts regarding this.

[1] - [keyManager]
serverUrl="https://localhost:9443";
username="admin"  // to connect with key validation admin service
password="admin"
tokenContext="oauth2"
timestampSkew=5000

[2] - [keyManager]
serverUrl="https://localhost:9443";
username="admin"  // to connect with key validation admin service
password="admin"
tokenContext="oauth2"
timestampSkew=5000
external = true

-- 
*Rajith Roshan* | Associate Technical Lead | WSO2 Inc.
(m) +94-717-064-214 |  (e) [email protected] <[email protected]>
blog: http://www.rajithr.com

<https://wso2.com/signature>
_______________________________________________
Dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/dev

Reply via email to