Skip to content

Add support for CA certificate for auth provider#3044

Open
lgutter wants to merge 1 commit intotemporalio:mainfrom
lgutter:add-ca-cert-support-in-auth
Open

Add support for CA certificate for auth provider#3044
lgutter wants to merge 1 commit intotemporalio:mainfrom
lgutter:add-ca-cert-support-in-auth

Conversation

@lgutter
Copy link
Copy Markdown

@lgutter lgutter commented Nov 28, 2025

Description & motivation 💭

When using an SSO provider with a certificate signed by our own internal CA, the ui server is currently unable to verify the certificate. This change adds support for providing a CA certificate to enable verification of the used certificate.

Screenshots (if applicable) 📸

N/A

Design Considerations 🎨

minimal impact, only used IF a CA cert is provided.

Testing 🧪

Added tests and I already use this to connect to a self-hosted keycloak.

How was this tested 👻

  • Manual testing
  • E2E tests added
  • Unit tests added

Steps for others to test: 🚶🏽‍♂️🚶🏽‍♀️

Deploy this new version & provide a caFile or caData (base64 encoded) to trust a custom certificate for SSO.

Checklists

Draft Checklist

Merge Checklist

Issue(s) closed

#2957

Docs

Any docs updates needed?

Changes required are mimimal, but the env vars for web UI should be updated with:

TEMPORAL_AUTH_CA
The path for the Transport Layer Security (TLS) Certificate Authority file for the auth provider endpoint.

In order to use TLS with a self-hosted Auth provider, you'll need a CA certificate issued by a trusted Certificate Authority. Set this variable to properly locate and use the file.

TEMPORAL_AUTH_CA_DATA
Stores the data for a TLS CA file.

This variable can be used instead of providing a path for `TEMPORAL_AUTH_CA`.

@lgutter lgutter requested a review from a team as a code owner November 28, 2025 09:38
@lgutter lgutter requested review from rossnelson and removed request for a team November 28, 2025 09:38
@vercel
Copy link
Copy Markdown

vercel bot commented Nov 28, 2025

@lgutter is attempting to deploy a commit to the Temporal Team on Vercel.

A member of the Team first needs to authorize it.

@CLAassistant
Copy link
Copy Markdown

CLAassistant commented Nov 28, 2025

CLA assistant check
All committers have signed the CLA.

@lgutter
Copy link
Copy Markdown
Author

lgutter commented Dec 5, 2025

@rossnelson @Alex-Tideman Any chance you can look at this? :)

@lgutter
Copy link
Copy Markdown
Author

lgutter commented Dec 15, 2025

@rossnelson @Alex-Tideman just a friendly reminder for this MR, would love to get this merged!

@varpa89
Copy link
Copy Markdown

varpa89 commented Mar 31, 2026

Hey, can we proceed with this please? This is a really necessary feature

@lgutter
Copy link
Copy Markdown
Author

lgutter commented Mar 31, 2026

@laurakwhit @rossnelson any chance you could have a look at this? it's a simple change with big impact for those who need it.

Copy link
Copy Markdown
Collaborator

@rossnelson rossnelson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @lgutter I left a few small comments, let me know what you think.

When using an SSO provider with a certificate signed by our own internal CA, the ui server is currently unable to verify the certificate.
This change adds support for providing a CA certificate to enable verification of the used certificate.
@lgutter lgutter force-pushed the add-ca-cert-support-in-auth branch from 46161c0 to a41b0e8 Compare April 2, 2026 17:19
@lgutter
Copy link
Copy Markdown
Author

lgutter commented Apr 2, 2026

Thanks @lgutter I left a few small comments, let me know what you think.

Thank you for the review @rossnelson. I completely agree with your feedback and have updated accordingly. Let me know if you need anything else from me to get this merged!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants