-
Hi Xmidt team, I am new to Xmidt and am currently exploring ways to authenticate CPEs. I have a few questions and would appreciate a quick response. It appears that the preferred method is to use JWTs issued by Themis to the CPE. However, I am unsure how the Themis /issue API is protected from unauthorized access in this scenario. The Xmidt documentation mentions using mTLS between CPE and Themis, but I haven't found a way to configure Themis to reject requests that lack mTLS authentication. The only configuration option I found was for setting the TLS server certificates:
How can mTLS be utilized with Themis? Alternatively, is there another method to secure the /issue API? Another option I discovered is mTLS for the WSS connection. Parodus has the options mtls-client-cert-path and mtls-client-key-path. However, I am also unsure how to enforce an mTLS WSS connection in Talaria. Is there a way to restrict Talaria to only allow mTLS-secured WSS connections? Thank you very much. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments
-
I chose JWT as the authentication mechanism for CPE and secured the issue API with an mTLS proxy. However, I am unable to configure Talaria to only accept CPEs with a valid JWT. This issue is similar to what has been described in xmidt-org discussions #74 and xmidt-org issue #25. Unfortunately, the link to the solution is no longer functional. Here is my Talaria configuration:
Prometheus command with JWT:
Prometheus command without JWT:
I can confirm that Prometheus is receiving and sending a valid JWT, but Talaria still accepts connections without the JWT. Can anyone provide guidance on how the configuration file should be set up to allow only connections with JWTs? |
Beta Was this translation helpful? Give feedback.
-
I found the issue. The docker image talaria:latest is too old for the config option failOpen: false. |
Beta Was this translation helpful? Give feedback.
I found the issue. The docker image talaria:latest is too old for the config option failOpen: false.