Configuring OAuth Authorization
Solace event brokers support two different types of OAuth tokens: access_token and id_token. The OAuth standards state that the access_token is required and is opaque data and that the id_token is optional and a JSON Web Token (JWT). Solace event brokers permit both types of tokens and also allow the access_token to be a JWT.
JWTs can be cryptographically signed. Solace event brokers support JWTs with the alg claim (a header parameter value) equal to: none, RS256, RS384, RS512, ES256, ES384, ES512. If the alg claim is anything else, it is rejected as an invalid token. If the header includes a type claim, it must identify the payload as JWT (this corresponds to the type or typ claim in the JWT header).
To implement OAuth authorization for clients connecting to a Solace event broker, the following configurations are required on the event broker:
- An OAuth profile must be configured and enabled for OAuth authentication. See Managing Message VPN OAuth Profiles.
- The source used to determine the authorization group must be configured. See Authorization Groups Claim.
- An authorization group must be configured and enabled on the event broker. See Configuring Authorization Groups.