Baoyuantop commented on issue #11015:
URL: https://github.com/apache/apisix/issues/11015#issuecomment-2994693291

   The current openid-connect plugin is designed to be incompatible with 
consumer-based authentication.
   
   The openid-connect plugin performs authentication based on an external 
identity provider and does not rely on the consumer mechanism within APISIX. 
After OIDC authentication is successful, no APISIX consumer will be created or 
associated
   
   If you want to use OIDC for authentication and implement user-based access 
control, you should:
   1. Use the openid-connect plugin only at the route level, not in the 
consumer.
   2. Use OIDC's built-in access control mechanisms, such as:
     - required_scopes parameter for permission control
     - Authorization based on JWT claims
     - Use a custom plugin to parse user information in the OIDC response
   
   Suppose you need to use both OIDC and consumer mechanisms. In that case, you 
can consider developing a custom plugin to create a temporary consumer based on 
user information after OIDC authentication succeeds.
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscr...@apisix.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to