1.15.4.7 The IDToken credential manager
This idtoken credential manager is a bit special. It doesn't load any credentials from an external source but instead generates JWTs which are signed by concourse and contain information about the pipeline/job that is currently running. It can NOT be used as a cluster-wide credential manager, but must instead be used as a var source.
These JWTs can be used to authenticate with external services via "identity federation" with the identity of the pipeline.
Examples for services that support authentication via JWTs are:
External services can verify if JWTs are actually issued by your Concourse, by checking the signatures on the JWTs against the public keys published by your Concourse.
The public keys for verification are published as JWKS at:
https://your-concourse-server.com/.well-known/jwks.json
Concourse also offers a OIDC Discovery Endpoint, which allows external services to auto-discover the JWKS-URL.
Usage
You create a var source of type idtoken
with the configuration you want (see Configuration) in your pipeline. That var source then exposes a single variable with a single field, token
, which contains the JWT and can be used in any step of your pipeline.
You can also have multiple idtoken
var sources in the same pipeline, each with different audiences, lifetimes etc.
var_sources:
- name: myidtoken
type: idtoken
config:
audience: ["sts.amazonaws.com"]
jobs:
- name: print-creds
plan:
- task: print
config:
platform: linux
image_resource:
type: mock
source: {mirror_self: true}
run:
path: bash
args:
- -c
- |
echo myidtoken: ((myidtoken:token))
Configuration
You can pass several config options to the idtoken
var source to customize the generated JWTs. For example, you can configure the aud
claim, token expiration, or granularity of the sub
claim. See idtoken
var source for all config options.
Subject Scope
Some external services (like AWS) only perform exact-matches on a token's sub-claim and ignore most other claims. To enable use-cases like "all pipelines of a team should be able to assume an AWS-Role", Concourse offers the option to configure how granular the sub
claim's value should be.
This is configured via the subject_scope
setting of the idtoken
var source.
Depending on the value of subject_scope
, the content of the JWT's sub
claim will differ:
subject_scope |
sub Value in JWT |
|
|
|
|
|
|
|
|
[1]: Instance vars are rendered as comma-separated key-value pairs. E.g.
my-var:my-value,hello:world
[2]: If a path element is empty (for example because you chose
job
on a pipeline with no instance-vars), the empty element is still added. E.g.my-team/my-pipeline//my-job
. Note the double forward-slashes between the pipeline and job name, where instance vars would go.
This way all your pipelines can simply get a token with subject_scope: team
and use this token to assume an AWS-Role that matches on sub: "your_team_name"
.
Example JWT
The generated tokens usually look something like this:
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJodHRwczovL3lvdXItY29uY291cnNlLmV4YW1wbGUuY29tIiwiZXhwIjoxNzUxMDE1NzM0LCJhdWQiOlsiYXBpOi8vQXp1cmVBRFRva2VuRXhjaGFuZ2UiXSwic3ViIjoibWFpbi9leGFtcGxlLXBpcGVsaW5lIiwidGVhbSI6Im1haW4iLCJwaXBlbGluZSI6ImV4YW1wbGUtcGlwZWxpbmUiLCJqb2IiOiJleGFtcGxlLWpvYiJ9.my7l44tH0wfz8vc6z3fMmzTMxZ8_orhjcsOti3BKSNo
And after decoding, looks like this:
{
"aud": "sts.amazonaws.com",
"exp": 1751282764,
"iat": 1751279164,
"iss": "https://your-concourse-server.com",
"job": "print-creds",
"pipeline": "mypipeline",
"sub": "main/mypipeline",
"team": "main"
}
Here is a short explanation of the different claims:
iss
: Who issued the token (always contains the external URL of your Concourse)exp
: When the token will expireaud
: Who the token is intended for. (In the above example it's for Azure's Identity Federation API)team
: The team of the pipeline this token was generated forpipeline
: The pipeline this token was generated forjob
: The name of the job (inside the pipeline) this token was generated forinstance_vars
: Any instance vars for the pipeline (if it is an instanced pipeline). Will be a comma-separated list of key-value pairs. E.g.hello:world,my-var:my-value
sub
: A combination of team + pipeline + instance_vars + job. Which parts are used here is configurable, see Subject Scope.
Automatic Key Rotation
Concourse will automatically rotate the signing keys used for creating the JWTs. The default rotation period is 7 days
. The previously used keys are being kept around for a while (by default 24h
) so that verification of currently existing JWTs doesn't fail during key rotation.
This behavior can be configured via the following ATC flags:
CONCOURSE_SIGNING_KEY_ROTATION_PERIOD
: How often to rotate the signing keys. Default:7d
. A value of0
means don't rotate at all.CONCOURSE_SIGNING_KEY_GRACE_PERIOD
: How long to keep previously used signing keys published in the JWKs after they have been rotated. Default:24h
.CONCOURSE_SIGNING_KEY_CHECK_INTERVAL
: How often to check if new keys are needed or if old ones should be removed. Default:10m