Deploy a viable instance of Identity Hub in a customized EDC. #4809
-
IssueWe are developing a custom connector based on the EDC technology. We have already created a successfull deployment of 2 custom connectors and have been using your postman collection to do some tests on them. However, at the time we try to include the Identity Hub, it all collapses. We are planning to deploy an IH+STS instance isolated from the connectors so the process is centralized, but this is not the example provided by the MVD repository. We have our 2 connectors up, do the onboarding using the same code as here and tried to retrieve the catalog from one connector (that has been seeded before) to another. Then, this is the response we get from this call: [
{
"message": "Unable to obtain credentials: Scope string invalid: input string was null or empty",
"type": "BadGateway",
"path": null,
"invalidValue": null
}
] ContextWe are using the latest version of EDC and its extensions (v0.11.1). And so we are for the Identity Hub. We are also using Hashicorp Vault to store our connector secrets and Postgres for persistence. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 2 replies
-
First of all, IdentityHub is a decentralized identity solution, so centralizing it goes against the idea and the design of it. If your dataspace requires centralized authentication, IdentityHub might not be your best choice. Also, embedding IdentityHub and STS in the connector - while possible - is not recommended, because in most real-world scenarios, scaling and isolation requirements differ enough for them to be separate. That said, and for the sake of argument, I am honestly at a loss as to what you want us to say or do: The client credentials cannot be obtained because the scope string is null or empty. The error says is plainly. A quick Scopes are derived from policy constraints that target a verifiable credential and are used to create an access token to IdentityHub. Numerous examples of this exist in MVD. Please familiarize yourself with DCP and DSP to understand the correlation between Policies, Scopes and VerifiableCredentials. |
Beta Was this translation helpful? Give feedback.
Just to avoid any misunderstanding: IdentityHubs can be shared among multiple connectors of the same organisation, but it should not be shared between multiple organisations. The latter case would constitute a centralized (= org-spanning) authentication system.
In the earlier case there are again two distinctions: