Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DM-42384: Fix protocol issues in OpenID Connect server #936

Merged
merged 1 commit into from
Jan 10, 2024
Merged

Conversation

rra
Copy link
Member

@rra rra commented Jan 10, 2024

Stop exposing all known claims by default in the issued ID token and instead honor scopes requested by the client. Currently, the supported scopes include the profile and email scopes defined by OpenID Connect (insofar as Gafaelfawr has the data).

Set the aud claim on ID tokens to the client ID rather than a fixed audience value that matches the Gafaelfawr issuer, bringing the implementation in line with the intent of the specification.

Tie the expiration time of OpenID Connect ID tokens to the expiration of the underlying Gafaelfawr token used as an authentication basis.

Require the oidcServer.issuer configuration setting use the https scheme, since the protocol requires that. Include the scope that was used for ID token issuance in the response from the token endpoint, since the spec may require that if unknown scopes were requested.

Declare, in the OpenID configuration endpoint, that the only supported response mode is query.

Stop exposing all known claims by default in the issued ID token
and instead honor scopes requested by the client. Currently, the
supported scopes include the profile and email scopes defined by
OpenID Connect (insofar as Gafaelfawr has the data).

Set the aud claim on ID tokens to the client ID rather than a fixed
audience value that matches the Gafaelfawr issuer, bringing the
implementation in line with the intent of the specification.

Tie the expiration time of OpenID Connect ID tokens to the expiration
of the underlying Gafaelfawr token used as an authentication basis.

Require the oidcServer.issuer configuration setting use the https
scheme, since the protocol requires that. Include the scope that was
used for ID token issuance in the response from the token endpoint,
since the spec may require that if unknown scopes were requested.

Declare, in the OpenID configuration endpoint, that the only
supported response mode is query.
@rra rra merged commit 4d48365 into main Jan 10, 2024
5 checks passed
@rra rra deleted the tickets/DM-42384 branch January 10, 2024 21:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant