-
Notifications
You must be signed in to change notification settings - Fork 360
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Propagate XFCC header to the backend #2599
Labels
Milestone
Comments
arkodg
added
triage
help wanted
Extra attention is needed
area/api
API-related issues
area/policy
kind/enhancement
New feature or request
and removed
triage
labels
Feb 12, 2024
Merged
how expensive is the computing process if we opt-in for the XFCC? this can also being used later in the authorization API |
@arkodg please assign this to me, thanks |
/assign zufardhiyaulhaq |
This issue has been automatically marked as stale because it has not had activity in the last 30 days. |
no stale |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Description:
Propagate the XFCC header to the client after validating the client via mutual TLS
https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/network/http_connection_manager/v3/http_connection_manager.proto#enum-extensions-filters-network-http-connection-manager-v3-httpconnectionmanager-forwardclientcertdetails
Decisions
Defaults / Opt in or opt out
Where should it live
a) https://gateway.envoyproxy.io/latest/api/extension_types/#headersettings
or
b) https://gateway.envoyproxy.io/latest/api/extension_types/#clientvalidationcontext
The text was updated successfully, but these errors were encountered: