mirror of
https://github.com/holos-run/holos.git
synced 2026-03-20 09:15:02 +00:00
Problem: Backend services and web apps expect to place their own credentials into the Authorization header. oauth2-proxy writes over the authorization header creating a conflict. Solution: Use the alpha configuration to place the id token into the x-oidc-id-token header and configure the service mesh to authenticate requests that have this header in place. Note: ZITADEL does not use a JWT for an access token, unlike Keycloak and Dex. The access token is not compatible with a RequestAuthentication jwt rule so we must use the id token.