HS256 is symmetric, so signing with the shared key should be all you need. I
don't see what you did wrong. Perhaps a space has sneaked in somewhere in the
key or how you copy it is not pure ascii? I'd encourage you to try evaluating
the token you build in Java or Javascript using the online tool
Of course the secret key is just for my local development solr instance 🙄
> On Sep 19, 2019, at 10:35 PM, Dave wrote:
>
> I know this has nothing to do with the issue at hand but if you have a public
> facing solr instance you have much bigger issues.
>
>> On Sep 19, 2019, at 10:16 PM, Ty
I know this has nothing to do with the issue at hand but if you have a public
facing solr instance you have much bigger issues.
> On Sep 19, 2019, at 10:16 PM, Tyrone Tse wrote:
>
> I finally got JWT Authentication working on Solr 8.1.1.
> This is my security.json file contents
> {
> "authe
I finally got JWT Authentication working on Solr 8.1.1.
This is my security.json file contents
{
"authentication":{
"class":"solr.JWTAuthPlugin",
"jwk":{
"kty":"oct",
"use":"sig",
"kid":"k1",
"k":"xbQNocUhLJKSmGi0Qp_4hAVfls9CWH5WoTrw543WTXi5H6G-AXFlHRaTK
See answer in other thread. JWT works for 8.1 or later, don’t attempt it in 7.x.
You could try to turn on debug logging for or.apache.solr.security to get more
logging.
Jan Høydahl
> 13. sep. 2019 kl. 00:24 skrev Tyrone Tse :
>
> Jan
>
> I tried using the JWT Plugin https://github.com/cominve
Jan
I tried using the JWT Plugin https://github.com/cominvent/solr-auth-jwt
If my security.json file is
{
"authentication": {
"class":"com.cominvent.solr.JWTAuthPlugin",
"jwk" : {
"kty": "oct",
"use": "sig",
"kid": "solr",
All I could see in the solr.log was ( could it be the java version ?)
main{ExitableDirectoryReader(UninvertingDirectoryReader(Uninverting(_0(8.2.0):C1:[diagnostics={java.vendor=Oracle
Corporation, os=Mac OS X, java.version=1.8.0_60, java.vm.version=25.60-b23,
lucene.version=8.2.0, os.arch=x86_64,
Please check the error message in solr.log on the server side and paste that
here. Could be a bug 🕷
Jan Høydahl
> 10. sep. 2019 kl. 18:51 skrev Tyrone Tse :
>
> Jan using https://mkjwk.org/
> I generated the following JWK
>
> {
>
> "kty": "oct",
> "use": "sig",
> "kid": "solr",
> "k":
>
Jan using https://mkjwk.org/
I generated the following JWK
{
"kty": "oct",
"use": "sig",
"kid": "solr",
"k":
"pIpVnjhuAj9DBg8e2lwya7o_uZMM3Wqo2eK0uchOza0vBS-orZNYTkLcHTLXF9JaCBR08tWfFEWVPENF6sXKuaj8Mn65Kc3QUmS-csblVvjj69dXk2Mi-Zs2iDDM3QyyvdiyRpfxE-xKwwjhU47xs7M0Dq69I1UE5nrFkczLf9qe3b47ha
I think you are confusing JWK with the JWT token. JWK is only for defining the
key, see https://mkjwk.org for an online JWK generator, you can choose HS256 as
algorithm. Put the generated JWK in Solr's config and also use the generated
key to sign your JWT. Then Solr should be able to validate t
Jan
Can my jwk object be something like
{alg": "HS256", "typ": "JWT",
"sub": "1234567890", "name": "John Doe", "iat": 1516239022,
“k" : "secret-key"}
Where k is the JWT secret key?
Sent from my iPhone
> On Sep 9, 2019, at 1:48 AM, Jan Høydahl wrote:
>
> In your security.json, add a JWK ma
In your security.json, add a JWK matching your signing algorithm, using the
“jwk” JSON key.
Example:
“jwk” : { "kty" : "oct", "kid" : "0afee142-a0af-4410-abcc-9f2d44ff45b5", "alg"
: "HS256", "k" : "FdFYFzERwC2uCBB46pZQi4GG85LujR8obt-KWRBICVQ" }
Of course you need to find a way to encode your pa
I have Solr 8.1 installed, and I have this sample JWT
HEADER:ALGORITHM & TOKEN TYPE { "alg": "HS256", "typ": "JWT" }
PAYLOAD:DATA
{ "sub": "1234567890", "name": "John Doe", "iat": 1516239022 }
The secret key is "your-256-bit-secret"
Which generates the encoded JWT of
eyJhbGciOiJIUzI1NiIsInR5cCI
13 matches
Mail list logo