-
-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
oauth2: id_ext not present on /oauth2/introspect or /warden/token/valid #290
Comments
The reasoning behind this is that the id token is self-contained but the access token is not. If you are allowed to receive an id token, you can extract the information from it. The access token has a different scope which is delegation of authorization. As that token is not self-contained, the information is provided at the endpoints. The id token is, in general, just a flow to let third parties use OAuth2 for delegation of authentication, without being vulnerable to token substitution attacks. I don't think that the id token should be used to transport information not relevant to this task. |
It's more the stuff that's in the ID token is also relevant to be used What is your use case for id_ext values that wouldn't be useful to a normal On Friday, 7 October 2016, Aeneas notifications@github.com wrote:
|
Usually, everything that is included in the Think of it as something that you would do if you use log in with google. It will give you some basic information that you can use in your log in or sign up endpoint. |
The abstract of the specification is:
|
I understand. But then how do I access things like email, profile pics, etc Although I can partially understand in that statement I just made why you You can close this issue if you like. I now understand the design decision On Friday, 7 October 2016, Aeneas notifications@github.com wrote:
|
This really depends, keep in mind that email etc should only be included if the right scopes where set during the initial oauth2 request. So that data might not be available at all. It really depends on your use case and if it makes more sense to include this in the access token validation response or in a separate request. I don't think that I can give a one-fits all recommendation here, sorry :/
This would be so awesome. Closing, because I don't think I can help any further with this issue. |
Only the
at_ext
values are present inside theextra
key when requesting tokens from these endpoints.id_ext
values passed back in the consent token don't appear to be returnable.The text was updated successfully, but these errors were encountered: