mirror of https://github.com/vouch/vouch-proxy
69 lines
3.2 KiB
Plaintext
69 lines
3.2 KiB
Plaintext
server {
|
|
listen 443 ssl http2;
|
|
server_name app1.yourdomain.com;
|
|
root /var/www/html/;
|
|
|
|
ssl_certificate /etc/letsencrypt/live/app1.yourdomain.com/fullchain.pem;
|
|
ssl_certificate_key /etc/letsencrypt/live/app1.yourdomain.com/privkey.pem;
|
|
|
|
# send all requests to the `/validate` endpoint for authorization
|
|
auth_request /validate;
|
|
|
|
location = /validate {
|
|
# Vouch Proxy can run behind the same Nginx reverse proxy
|
|
# may need to comply to "upstream" server naming
|
|
proxy_pass https://vouch.yourdomain.com:9090/validate;
|
|
|
|
# be sure to pass the original host header
|
|
proxy_set_header Host $http_host;
|
|
|
|
# Vouch Proxy only acts on the request headers
|
|
proxy_pass_request_body off;
|
|
proxy_set_header Content-Length "";
|
|
|
|
# optionally add X-Vouch-User as returned by Vouch Proxy along with the request
|
|
auth_request_set $auth_resp_x_vouch_user $upstream_http_x_vouch_user;
|
|
|
|
# optionally add X-Vouch-IdP-Claims-* custom claims you are tracking
|
|
# auth_request_set $auth_resp_x_vouch_idp_claims_groups $upstream_http_x_vouch_idp_claims_groups;
|
|
# auth_request_set $auth_resp_x_vouch_idp_claims_given_name $upstream_http_x_vouch_idp_claims_given_name;
|
|
# optinally add X-Vouch-IdP-AccessToken or X-Vouch-IdP-IdToken
|
|
# auth_request_set $auth_resp_x_vouch_idp_accesstoken $upstream_http_x_vouch_idp_accesstoken;
|
|
# auth_request_set $auth_resp_x_vouch_idp_idtoken $upstream_http_x_vouch_idp_idtoken;
|
|
|
|
# these return values are used by the @error401 call
|
|
auth_request_set $auth_resp_jwt $upstream_http_x_vouch_jwt;
|
|
auth_request_set $auth_resp_err $upstream_http_x_vouch_err;
|
|
auth_request_set $auth_resp_failcount $upstream_http_x_vouch_failcount;
|
|
}
|
|
|
|
# if validate returns `401 not authorized` then forward the request to the error401block
|
|
error_page 401 = @error401;
|
|
|
|
location @error401 {
|
|
# redirect to Vouch Proxy for login
|
|
return 302 https://vouch.yourdomain.com/login?url=$scheme://$http_host$request_uri&vouch-failcount=$auth_resp_failcount&X-Vouch-Token=$auth_resp_jwt&error=$auth_resp_err;
|
|
}
|
|
|
|
# proxy pass authorized requests to your service
|
|
location / {
|
|
proxy_pass http://app1-private.yourdomain.com:8080;
|
|
# may need to set
|
|
# auth_request_set $auth_resp_x_vouch_user $upstream_http_x_vouch_user;
|
|
# auth_request_set $auth_resp_x_vouch_idp_claims_groups $upstream_http_x_vouch_idp_claims_groups;
|
|
# auth_request_set $auth_resp_x_vouch_idp_claims_given_name $upstream_http_x_vouch_idp_claims_given_name;
|
|
|
|
# set user header (usually an email)
|
|
proxy_set_header X-Vouch-User $auth_resp_x_vouch_user;
|
|
# optionally pass any custom claims you are tracking
|
|
# proxy_set_header X-Vouch-IdP-Claims-Groups $auth_resp_x_vouch_idp_claims_groups;
|
|
# proxy_set_header X-Vouch-IdP-Claims-Given_Name $auth_resp_x_vouch_idp_claims_given_name;
|
|
# optionally pass the accesstoken or idtoken
|
|
# proxy_set_header X-Vouch-IdP-AccessToken $auth_resp_x_vouch_idp_accesstoken;
|
|
# proxy_set_header X-Vouch-IdP-IdToken $auth_resp_x_vouch_idp_idtoken;
|
|
|
|
# Authenticate the application by user
|
|
access_by_lua_file lua/user_auth.lua;
|
|
}
|
|
}
|