While the integration of stac-auth-proxy in (#222 and #358) provides OIDC-based authentication, some deployments may require custom authorization logic beyond the default endpoint protection. For example:
- Collection-level access control (e.g., user A can read collection X but not collection Y)
- Item-level permissions based on custom attributes
- Role-based access control with custom roles defined outside the OIDC provider
Currently, stac-auth-proxy validates tokens and protects endpoints, but doesn't provide hooks for custom authorization decisions.
This is to discuss our approach to this and then implement a solution.
While the integration of
stac-auth-proxyin (#222 and #358) provides OIDC-based authentication, some deployments may require custom authorization logic beyond the default endpoint protection. For example:Currently,
stac-auth-proxyvalidates tokens and protects endpoints, but doesn't provide hooks for custom authorization decisions.This is to discuss our approach to this and then implement a solution.