Skip to content
This repository was archived by the owner on Sep 1, 2020. It is now read-only.
This repository was archived by the owner on Sep 1, 2020. It is now read-only.

Requesting ID Token with max_age=10000 seconds restriction expects same authentication #184

@quartje

Description

@quartje

We run into a problem regarding the Requesting ID Token with max_age=10000 seconds restriction test. Our OpenID Connect OP implementation is implemented as a proxy, and all authorization requests are proxied to another SAML proxy, since all authorization and authentication policies live there. We do support the max_age parameter, in a sense that we do a forced authn when the time in the max_age parameter has elapsed. However, when the time has not elapsed, we also re-authenticate the user. This leads to the following certification test error:

same-authn: status=ERROR, message=Not one authentication! [Verifies that the same authentication was used twice in the flow.]

I would like to argue that this does not violate the spec:

max_age
   OPTIONAL. Maximum Authentication Age. Specifies the allowable elapsed time in seconds since the last time the End-User was actively authenticated by the OP. If the elapsed time is greater than
this value, the OP MUST attempt to actively re-authenticate the End-User. (The max_age request
parameter corresponds to the OpenID 2.0 PAPE [OpenID.PAPE] max_auth_age request parameter.) When max_age is used, the ID Token returned MUST include an auth_time Claim Value.

It doesn't say that you need to reuse the authentication when the time elapsed since the last authentication is smaller than the max_age parameter.

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions