How to handle Third Party Initiated Login with Passport Strategy #510
Replies: 3 comments
-
@panva could I get your opinion on how this should be behave? |
Beta Was this translation helpful? Give feedback.
0 replies
-
@panva circling back to this, I'm still unsure if mutating the |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I'm working on a Okta initiated login and seeing an error I wasn't expecting. Okta will send an
iss
query param as per section 4 of the spec, however, that triggersopenid-client
into starting the auth response flow instead of the auth request flow.eg. a call to
https://my-org.com/login/sso/some-idp-id?iss=https%3A%2F%2Fsome-org.okta.com
results in the error:"did not find expected authorization request details in session, req.session["oidc:some-org.okta.com"] is undefined"
Here is the smallest reproduction I came up with:
In my case I'll be using dedicated URL paths for each IdP, so my code has no need for the
iss
param.I think I expected
openid-client
to assert theiss
against theIssuer
or ignore it.My impression is that this is a bug or missing feature from the library itself.
Currently, my only option would be to override the
IncomingMessage.url
by stripping the query, but that seems like kludge.Which direction should I go?
Beta Was this translation helpful? Give feedback.
All reactions