-
Notifications
You must be signed in to change notification settings - Fork 599
Consider renaming OAuthBearer #413
Comments
Let's go with |
The OAuth2 bearer middleware is not tied to JWT since it only requires a Not to mention that you can also use your own token format using the |
Related (old) comments about I agree with @Tratcher: we really need a basic "token validation" middleware that behaves exactly like the OAuth2 bearer token middleware built in Katana, taking no dependency on the OIDC extensions. Making Personally, I'd rename the existing OAuth2 bearer middleware to @brentschmaltz @Tratcher all these changes are great and we definitely need them (the OIDC configuration discovery is just amazing). But we also need a basic token validation middleware that behaves exactly like the existing OAuth2 bearer middleware and allows full pluggability without relying on complicated and OIDC-specific things. Here's my suggestion:
|
@PinpointTownes I'm told SAML can't be used for bearer auth because the tokens are too long. As for hooking MessageReceived and reading your own token, you'd still have to override most of the validation notifications as well so at that point you might as well use a different middleware. |
True, but this limitation is caused by the headers length limits configured by the host, not by the OAuth2 bearer middleware. The same error may occur with a JWT access token containing too many claims. |
The OAuthBearer middleware is not a generic bearer token handler, it only supports JWT's. Consider renaming this one to something more specific (JWTBearer? OAughJWT?) so that we can create a more generic one later.
The text was updated successfully, but these errors were encountered: