Cert-bound access tokens without client secret or IDv1.0+

Configure the OpenID Connect plugin to use certificate-bound access tokens without a client secret or ID. Instead, you can use the TLS Handshake Modifier plugin to request a client certificate and make it available to the OpenID Connect plugin.

The OIDC plugin will validate and use the provided certificates to authenticate with your IdP and retrieve a bearer token.

Prerequisites

  • The TLS Handshake Modifier plugin is configured to request client certificates from your IdP

  • An identity provider (IdP) configured with mTLS and X.509 client certificate authentication

Environment variables

  • ISSUER: The well-known issuer endpoint of your IdP, for example http://keycloak.test:8080/realms/master.

Set up the plugin

Something wrong?

Help us make these docs great!

Kong Developer docs are open source. If you find these useful and want to make them better, contribute today!