このページは、まだ日本語ではご利用いただけません。翻訳中です。
Changelog
Kong Gateway 3.10.x
- Removed issuer discovery from schema to improve performance upon plugin initialization or updating. The issuer discovery will only be triggered by client requests.
- Fixed an issue where forbidden requests were redirected to
unauthorized_redirect_uriif configured. After the fix, forbidden requests will be redirected toforbidden_redirect_uriif configured.
Kong Gateway 3.9.x
- The
http_proxy_authorizationandhttps_proxy_authorizationfields are now referenceable. - Added the
introspection_post_args_client_headersconfig option, allowing you to pass client headers as introspection POST body arguments. - Fixed an
500error caused by JSONnullfrom the request body when parsing bearer tokens or client IDs. - Fixed an issue where the configured Redis database was ignored.
- Fixed an issue where the
token_cache_key_include_scopefeature was not considering scopes defined viaconfig.scopesto generate the cache key.
Kong Gateway 3.8.x
- Added support for Redis caching introspection results with the new fields
cluster_cache_strategyandcluster_cache_redis. When configured, the plugin will share the token introspection response cache across nodes configured to use the same Redis database. - Added the
claims_forbiddenproperty to restrict access. - Fixed an issue where anonymous consumers could be cached as nil under a certain condition.
- Updated the rediscovery to use a short lifetime (5s) if the last discovery failed.
- Fixed an issue where
using_pseudo_issuerdidn’t work when sendingPATCHrequests.
Kong Gateway 3.7.x
- Added support for DPoP (Demonstrating Proof-of-Possession) token validation.
You can enable it using the configuration parameter
proof_of_possession_dpop. - Added support for JWT Secured Authorization Requests (JAR) on Authorization and Pushed Authorization (PAR) endpoints.
See the configuration parameter
require_signed_request_object. - Added support for JARM response modes:
query.jwt,form_post.jwt,fragment.jwt, andjwt.
Kong Gateway 3.6.x
Features:
- The configuration parameters
scopes,login_redirect_uri,logout_redirect_uri, andintrospection_headers_valuescan now be referenced as secrets in the Kong Vault. - Extended the
token_post_args_clientconfiguration parameter to support injection from headers. - Added support for explicit proof key for code exchange (PKCE).
- Added support for pushed authorization requests (PAR).
- Added support for the
tls_client_authandself_signed_tls_client_authauthentication methods, allowing mTLS client authentication with the IdP.
Fixes:
- Fixed logout URI suffix detection by using the normalized version of
kong.request.get_forwarded_path()instead ofngx.var.request_uri, especially when passing query strings to logout. - The
introspection_headers_valuesconfiguration parameter can now be encrypted. - Removed the unwanted argument
ignore_signature.userinfofrom theuserinfo_loadfunction. - Added support for consumer group scoping by using the PDK
kong.client.authenticatefunction. - Fixed the cache key collision when config
issuerandextra_jwks_uriscontain the same URI. - The plugin now correctly handled boundary conditions for token expiration time checking.
- The plugin now updates the time when calculating token expiration.
Kong Gateway 3.5.x
- Added the new field
unauthorized_destroy_session. When set totrue, it destroys the session when receiving an unauthorized request by deleting the user’s session cookie. - Added the new field
using_pseudo_issuer. When set totrue, the plugin instance will not discover configuration from the issuer. - Added support for public clients for token revocation and introspection.
- Added support for designating parameter names
introspection_token_param_nameandrevocation_token_param_name. - Added support for mTLS proof of possession. The feature is available by enabling
proof_of_possession_mtls.
Kong Gateway 3.4.x
- This plugin now supports the error reason header.
This header can be turned off by setting
expose_error_codetofalse. - OpenID Connect now supports adding scope to the token cache key by
setting
token_cache_key_include_scopetotrue. - Changed some log levels from
noticetoerrorfor better visibility. - Correctly set the right table key on
logandmessage. - If an invalid opaque token is provided but verification fails, the plugin now prints the correct error.
Kong Gateway 3.2.x
- The plugin has been updated to use version 4.0.0 of the
lua-resty-sessionlibrary which introduced several new features such as the possibility to specify audiences. The following configuration parameters have been affected:
Added:
session_audiencesession_remembersession_remember_cookie_namesession_remember_rolling_timeoutsession_remember_absolute_timeoutsession_absolute_timeoutsession_request_headerssession_response_headerssession_store_metadatasession_enforce_same_subjectsession_hash_subjectsession_hash_storage_key
Renamed:
-
authorization_cookie_lifetimetoauthorization_rolling_timeout -
authorization_cookie_samesitetoauthorization_cookie_same_site -
authorization_cookie_httponlytoauthorization_cookie_http_only -
session_cookie_lifetimetosession_rolling_timeout -
session_cookie_idletimetosession_idling_timeout -
session_cookie_samesitetosession_cookie_same_site -
session_cookie_httponlytosession_cookie_http_only -
session_memcache_prefixtosession_memcached_prefix -
session_memcache_sockettosession_memcached_socket -
session_memcache_hosttosession_memcached_host -
session_memcache_porttosession_memcached_port -
session_redis_cluster_maxredirectionstosession_redis_cluster_max_redirections
Removed:
session_cookie_renewsession_cookie_maxsizesession_strategysession_compressor
Kong Gateway 3.0.x
- The deprecated
session_redis_authfield has been removed from the plugin.
Kong Gateway 2.8.x
-
Added the
session_redis_usernameandsession_redis_passwordconfiguration parameters.These parameters replace the
session_redis_authfield, which is now deprecated and planned to be removed in 3.x.x. -
Added the
resolve_distributed_claimsconfiguration parameter. -
The
client_id,client_secret,session_secret,session_redis_username, andsession_redis_passwordconfiguration fields are now marked as referenceable, which means they can be securely stored as secrets in a vault. References must follow a specific format.
Kong Gateway 2.7.x
-
Starting with Kong Gateway 2.7.0.0, if keyring encryption is enabled, the
config.client_id,config.client_secret,config.session_auth, andconfig.session_redis_authparameter values will be encrypted.Additionally, the
d,p,q,dp,dq,qi,oth,r,t, andkfields insideopenid_connect_jwks.previous[...].andopenid_connect_jwks.keys[...]will be marked as encrypted.There’s a bug in Kong Gateway that prevents keyring encryption from working on deeply nested fields, so the
encrypted=truesetting does not currently have any effect on the nested fields in this plugin. -
The plugin now allows Redis cluster nodes to be specified by hostname through the
session_redis_cluster_nodesfield, which is helpful if the cluster IPs are not static.
Kong Gateway 2.6.x
- The OpenID Connect plugin can now handle JWT responses from a
userinfoendpoint. - Added support for JWE introspection.
- Added a new parameter,
by_username_ignore_case, which allowsconsumer_byusername values to be matched case-insensitive with identity provider (IdP) claims.