Oidcauth Extension
contrib, k8s
Maintainers: @asweet-confluent
Source: opentelemetry-collector-contrib
Overview
This extension implements aconfigauth.ServerAuthenticator, to be used in receivers inside the auth settings. The authenticator type has to be set to oidc.
Configuration
Provider Matching
Although multiple OIDC providers can be configured, incoming tokens will only be verified against a single provider. This is done by decoding the token, extracting theiss claim, and checking the configured providers for one with a matching issuer_url field.
If no matching issuer_url is found, the extension will fail to authenticate with an error informing the caller that no OIDC provider configured for the issuer.
Configuration Structure Change
Earlier versions of this extension only allowed configuring a single provider:Configuring Public Keys
By default, this extension will use OpenID Connect Discovery to retrieve the set of public keys used to verify JWT signatures. While this data is cached, it does require the extension to be able to reach the provider endpoint at startup and periodically throughout the lifetime of the collector process. Optionally, apublic_keys_file can be configured on a per-provider basis. When configured, discovery is disabled and the provided file will be parsed as a JWK Set. The public keys contained in the set will be used to verify JWT signatures:
Accessing JWT Claims
The OIDC extension allows you to access JWT claims in the processor context. This allows you to implement custom labeling based on received JWT token claims.Last generated: 2026-04-13