This repository was archived by the owner on Sep 1, 2020. It is now read-only.

Description
We run into a problem regarding the Requesting ID Token with max_age=10000 seconds restriction test. Our OpenID Connect OP implementation is implemented as a proxy, and all authorization requests are proxied to another SAML proxy, since all authorization and authentication policies live there. We do support the max_age parameter, in a sense that we do a forced authn when the time in the max_age parameter has elapsed. However, when the time has not elapsed, we also re-authenticate the user. This leads to the following certification test error:
same-authn: status=ERROR, message=Not one authentication! [Verifies that the same authentication was used twice in the flow.]
I would like to argue that this does not violate the spec:
max_age
OPTIONAL. Maximum Authentication Age. Specifies the allowable elapsed time in seconds since the last time the End-User was actively authenticated by the OP. If the elapsed time is greater than
this value, the OP MUST attempt to actively re-authenticate the End-User. (The max_age request
parameter corresponds to the OpenID 2.0 PAPE [OpenID.PAPE] max_auth_age request parameter.) When max_age is used, the ID Token returned MUST include an auth_time Claim Value.
It doesn't say that you need to reuse the authentication when the time elapsed since the last authentication is smaller than the max_age parameter.