Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[oidc] always provide auth_time in idToken #5956

Closed
leleueri opened this issue Aug 3, 2021 · 1 comment
Closed

[oidc] always provide auth_time in idToken #5956

leleueri opened this issue Aug 3, 2021 · 1 comment

Comments

@leleueri
Copy link
Contributor

leleueri commented Aug 3, 2021

If an ID Token is returned as a result of a token refresh request, if the ID Token contains an auth_time Claim, its value MUST represent the time of the original authentication - not the time that the new ID token is issued.

https://openid.net/specs/openid-connect-core-1_0.html#RefreshTokenResponse

According to OIDC specification (https://openid.net/specs/openid-connect-core-1_0.html#IDToken),

This claim is optional but REQUIRED if the max_age parameter is specified or it the auth_time is part of the claims request. We decided to always provide this claim during the Financial-grand API conformance implementation since this claim was return by default in some cases.

@leleueri leleueri added this to the AM - 3.11.0 milestone Aug 3, 2021
@leleueri leleueri changed the title [OIDC][FAPI] auth_time must be present after a refresh token [OIDC][FAPI] always provide auth_time in idToken Aug 4, 2021
@tcompiegne tcompiegne changed the title [OIDC][FAPI] always provide auth_time in idToken [oidc] always provide auth_time in idToken Aug 13, 2021
leleueri added a commit to gravitee-io/gravitee-access-management that referenced this issue Aug 13, 2021
@ashok304u
Copy link

@leleueri Is there any update on this, I'm facing the same issue

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants