1/29/2024 0 Comments Jitsi meet authenticationThe “room” claim is to check whether the user has access to a certain room. Jitsi needs two claims inside of the jwt, which are “room” and “bnf”. You can click on the “Create” button on the top right to create custom mappers which we need to do. Head over to the “Mappers” tab which shows the different custom or built-in claims that have been set up. Navigate to the client that you are using for the app, in the Keycloak admin panel. Verifying JWT Signature using Public Key Keycloak Configuration To verify the authenticity of a jwt token we take the public key, the received jwt header and jwt payload and verify it with the signature of the jwt. Generating JWT Signature using Private Key For this keycloak signs the jwt using its private key, this is done by taking the jwt header and jwt payload and signing it with the private key as shown in the diagram below. The other approach for verifying jwt tokens is using private and public keys which Keycloak also supports. This is an easier approach but it is a bit tedious since we have to keep the secret synched with the applications. First is by using a shared secret that is known by the systems that need to verify the tokens. JWT Tokens can use two methods to prove their authenticity. ![]() The figure below gives an overview of how the process works, the app first authenticates itself with Keycloak to retrieve the Jwt token after which it can use it to access Jitsi.īasic Jitsi Keycloak Authentication Flow Private Key-Public Key JWT Tokens The goal of this article is to show how to secure your Jitsi service using Keycloak. This article assumes that you have a basic understanding of jwt tokens, Keycloak and Jitsi. Jitsi, which is an open-source video conferencing platform, allows us to authenticate using different methods. Authentication is an important aspect of the software.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |