Unlock a world of possibilities! Login now and discover the exclusive benefits awaiting you.
Nov 21, 2022 7:05:02 AM
Jun 3, 2017 4:03:15 AM
This article explains how to simply set up JWT authentication using Qlik Sense default certificates and test it.
Click here for Video Transcript
In order to integrate your solution with Qlik Sense using JWT authentication, you will need to pass in your code the JWT token in the authorization token for the first request to Qlik Sense so that a session is created.
Hi,
Great example! you can also run a JWT server with qlik sense embedded in an Iframe using https://community.qlik.com/t5/Support-Knowledge-Base/Qlik-Sense-How-to-set-up-JWT-authentication/ta-...
What to do if the JWT has rotating keys? For example Okta and the like rotate keys every 24 hours and therefore have multiple keys enabled at any time?
Can it work with an JWK URI instead?
More slides around jwt and Qlik cloud security (for OEM setups): https://integration.qlik.com/?selection=AHSkk7ZCD95SYttxF
So the posts above were for qlik cloud, but you can also do everything on client managed with the APIs. there is not JWK uri
yes, I thought about it too.
The issue is that for enterprise servers, to use this API to create new or update a virtual proxy, the only solution to authenticate is using client certificate authentication, which is like a root access on Qlik. So this adds a lot of overhead and security implications and it feels of very high risk for something that could have been done by Qlik itself.
Clearly when JWT was implemented there was a lack of understanding of what the tokens are for, because any enterprise implementation would have keys rotation given that JWT is stateless and as an attack vector, one would want to reduce the surface area rotating keys as much as possible.
Could you revisit this and ask if the functionality could be added?
According to JWT authentication, encrypted JWT isn't supported (i.e. HTTPS). So how would one work around this?