Re: [PoC] Federated Authn/z with OAUTHBEARER - Mailing list pgsql-hackers
From | Jacob Champion |
---|---|
Subject | Re: [PoC] Federated Authn/z with OAUTHBEARER |
Date | |
Msg-id | CAAWbhmiPjeVmZuB47BDZEgJD5kNXkxibtzxDtX9wysJKxLNnOw@mail.gmail.com Whole thread Raw |
In response to | Re: [PoC] Federated Authn/z with OAUTHBEARER (Andrey Chudnovsky <achudnovskij@gmail.com>) |
Responses |
Re: [PoC] Federated Authn/z with OAUTHBEARER
|
List | pgsql-hackers |
On Mon, Dec 12, 2022 at 9:06 PM Andrey Chudnovsky <achudnovskij@gmail.com> wrote: > If your concern is extension not honoring the DBA configured values: > Would a server-side logic to prefer HBA value over extension-provided > resolve this concern? Yeah. It also seals the role of the extension here as "optional". > We are definitely biased towards the cloud deployment scenarios, where > direct access to .hba files is usually not offered at all. > Let's find the middle ground here. Sure. I don't want to make this difficult in cloud scenarios -- obviously I'd like for Timescale Cloud to be able to make use of this too. But if we make this easy for a lone DBA (who doesn't have any institutional power with the providers) to use correctly and securely, then it should follow that the providers who _do_ have power and resources will have an easy time of it as well. The reverse isn't necessarily true. So I'm definitely planning to focus on the DBA case first. > A separate reason for creating this pre-authentication hook is further > extensibility to support more metadata. > Specifically when we add support for OAUTH flows to libpq, server-side > extensions can help bridge the gap between the identity provider > implementation and OAUTH/OIDC specs. > For example, that could allow the Github extension to provide an OIDC > discovery document. > > I definitely see identity providers as institutional actors here which > can be given some power through the extension hooks to customize the > behavior within the framework. We'll probably have to make some compromises in this area, but I think they should be carefully considered exceptions and not a core feature of the mechanism. The gaps you point out are just fragmentation, and adding custom extensions to deal with it leads to further fragmentation instead of providing pressure on providers to just implement the specs. Worst case, we open up new exciting security flaws, and then no one can analyze them independently because no one other than the provider knows how the two sides work together anymore. Don't get me wrong; it would be naive to proceed as if the OAUTHBEARER spec were perfect, because it's clearly not. But if we need to make extensions to it, we can participate in IETF discussions and make our case publicly for review, rather than enshrining MS/GitHub/Google/etc. versions of the RFC and enabling that proliferation as a Postgres core feature. > Obtaining a token is an asynchronous process with a human in the loop. > Not sure if expecting a hook function to return a token synchronously > is the best option here. > Can that be an optional return value of the hook in cases when a token > can be obtained synchronously? I don't think the hook is generally going to be able to return a token synchronously, and I expect the final design to be async-first. As far as I know, this will need to be solved for the builtin flows as well (you don't want a synchronous HTTP call to block your PQconnectPoll architecture), so the hook should be able to make use of whatever solution we land on for that. This is hand-wavy, and I don't expect it to be easy to solve. I just don't think we have to solve it twice. Have a good end to the year! --Jacob
pgsql-hackers by date: