-
Notifications
You must be signed in to change notification settings - Fork 925
Description
Preflight Checklist
- I could not find a solution in the existing issues, docs, nor discussions
- I have joined the ZITADEL chat
Describe the docs your are missing or that are wrong
Zitadel allows overwriting the requested host using headers. This was mostly implemented for login v2, but may solve other use cases as well.
I found just another simple reference on the subject: https://zitadel.com/docs/self-hosting/manage/custom-domain#running-zitadel-behind-a-reverse-proxy which links to some examples. However, there is no definitive resource on the headers we accept and how they influence zitadel's behaviour. I think we should create a dedicated page with all headers and what they do, and expand further in certain solution and example guides.
Additional Context
Example use-case
We recently got a customer with the following use case:
They have 4 relevant components, I've renamed / simplified some terms to more generic ones.
- Application: completing Oauth authentication to obtain a token.
- API: called by the application, authenticated by the token.
- Reverse proxy: sits between Zitadel and the public internet
- Zitadel: on a private network
The application obtains a token over the public network, through the reverse proxy, from zitadel. Using the public domain of the reversed proxy. That domain becomes the issuer of the token. The token is then used in a call to the API. However, the API is also on the private network, so it calls Zitadel (introspection?) using the internal network, using the internal Hostname. Zitadel now refuses the token because the issuer does not match the host.
I'm not sure, but I think this also came up on discord a number of times where APIs are part of the same Docker network as Zitadel.
Header definitions
All headers used by the zitadel API are currently defined as constants here:
zitadel/internal/api/http/header.go
Lines 12 to 58 in 3e2fde0
| const ( | |
| Authorization = "authorization" | |
| Accept = "accept" | |
| AcceptLanguage = "accept-language" | |
| CacheControl = "cache-control" | |
| ContentType = "content-type" | |
| ContentLength = "content-length" | |
| ContentLocation = "content-location" | |
| Expires = "expires" | |
| Location = "location" | |
| Origin = "origin" | |
| Pragma = "pragma" | |
| UserAgentHeader = "user-agent" | |
| ForwardedFor = "x-forwarded-for" | |
| ForwardedHost = "x-forwarded-host" | |
| ForwardedProto = "x-forwarded-proto" | |
| Forwarded = "forwarded" | |
| Host = "host" | |
| ZitadelForwarded = "x-zitadel-forwarded" | |
| XUserAgent = "x-user-agent" | |
| XGrpcWeb = "x-grpc-web" | |
| XRequestedWith = "x-requested-with" | |
| XRobotsTag = "x-robots-tag" | |
| IfNoneMatch = "if-none-match" | |
| LastModified = "last-modified" | |
| Etag = "etag" | |
| GRPCTimeout = "grpc-timeout" | |
| ConnectProtocolVersion = "connect-protocol-version" | |
| ConnectTimeoutMS = "connect-timeout-ms" | |
| GrpcStatus = "grpc-status" | |
| GrpcMessage = "grpc-message" | |
| GrpcStatusDetailsBin = "grpc-status-details-bin" | |
| ContentSecurityPolicy = "content-security-policy" | |
| XXSSProtection = "x-xss-protection" | |
| StrictTransportSecurity = "strict-transport-security" | |
| XFrameOptions = "x-frame-options" | |
| XContentTypeOptions = "x-content-type-options" | |
| ReferrerPolicy = "referrer-policy" | |
| FeaturePolicy = "feature-policy" | |
| PermissionsPolicy = "permissions-policy" | |
| ZitadelOrgID = "x-zitadel-orgid" | |
| OrgIdInPathVariableName = "orgId" | |
| OrgIdInPathVariable = "{" + OrgIdInPathVariableName + "}" | |
| ) |
Metadata
Metadata
Assignees
Labels
Type
Projects
Status