Baoyuantop commented on issue #11015: URL: https://github.com/apache/apisix/issues/11015#issuecomment-2994693291
The current openid-connect plugin is designed to be incompatible with consumer-based authentication. The openid-connect plugin performs authentication based on an external identity provider and does not rely on the consumer mechanism within APISIX. After OIDC authentication is successful, no APISIX consumer will be created or associated If you want to use OIDC for authentication and implement user-based access control, you should: 1. Use the openid-connect plugin only at the route level, not in the consumer. 2. Use OIDC's built-in access control mechanisms, such as: - required_scopes parameter for permission control - Authorization based on JWT claims - Use a custom plugin to parse user information in the OIDC response Suppose you need to use both OIDC and consumer mechanisms. In that case, you can consider developing a custom plugin to create a temporary consumer based on user information after OIDC authentication succeeds. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: notifications-unsubscr...@apisix.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org