-
Notifications
You must be signed in to change notification settings - Fork 61
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make sure validated id_token acr claim equals specified oxTrust authn method #513
Comments
oxTrust validates authentication method which oxAuth used for authentication already: @shekhar16 can you try to change in authorization request acr_values parameter? |
yes i agree ,but as per Mike we had to redirect to oxauth/login with params like nonce + acr values |
I think we should not add property to explicitly specify https://{host}/oxauth/login Right now oxTrust has property 'oxAuthIssuer'. At user login it request metadata from specified server. And uses 'authorization_endpoint' in order to send request. There is only one missing part. oxTrust should verify if specified issuer really issued id_token for oxTrust. It can check ISSUER claim of id_token |
Yes, it should verify both the |
Fixed. |
This fix needs to be applied to 3.0.2 |
How to authenticate is controlled via the browser (i.e. a GET request to the
authorize
endpoint). So nothing stops a user from using a different type of authentication just by changing the value of the authorization endpoint URL. However, once authenticated, the validatedid_token
can be trusted. Therefore, when oxTrust creates an application session, if an authn method is specified for oxTrust (see screenshot below), theid_token
acr claim should match.Ideally, if the authn method was not matching, oxTrust would redirect back to oxAuth with authorization request params
prompt=login
and 'acr_values=(specified)`The text was updated successfully, but these errors were encountered: