-
-
Notifications
You must be signed in to change notification settings - Fork 665
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Can't login to AKHQ with too many groups/patterns #2013
Comments
When I had this issue (before the token compression), the workaround that I put in place was (for my setup in K8S)
nginx.ingress.kubernetes.io/server-snippet: |
client_header_buffer_size 100k;
large_client_header_buffers 4 100k; Did you already try something like this ? |
With basic-auth, this seems to be working even with quite big amounts of groups/patterns.
This is our configuration:
|
We had the same issue that the cookie size became too big and therefore for basic-auth we could use token-based authentication to avoid cookie limits but for OAuth2 this wasn't the case and from my understanding is not possible. |
Hi,
we have a case of an OIDC user who has too many patterns in his groups assigned.
You probably know about this issue, the jwt token for login will be composed of all the groups + patterns, thus resulting in a jwt token which is too big for the browser -> login not possible.
Is there any way around this? AKHQ already compresses all groups + patterns + roles of a user, so we don't see any room for optimisation on our side.
The last time this issue was addressed was with this PR: #1630, but it somehow just defers the problem.
Regards
The text was updated successfully, but these errors were encountered: