-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
oauth2: Allow multiple audience claims on ID token #790
Comments
Sorry for my silence on this, but we tracked this issue internally and will address it with the 1.0.0 release! |
This is an upstream issue in fosite (patch pending). When upgrading, we'll also have to change how |
For note, I'm trying to run the master HEAD version of hydra right now and multiple OpenID Connect libraries are reporting something akin to:
Such as, for an open source example, the one at: https://github.com/go-gitea/gitea/blob/master/vendor/github.com/markbates/goth/providers/openidConnect/openidConnect.go#L202 |
And more testing, it looks like hydra is returning |
This is tracked as #883 |
Regarding string/array - array MUST be supported according to spec. String MAY be supported, see JWT spec:
|
Yep, I've already submitted a PR to them. Just curious if there is a way to just send a single string regardless when there is only a single string in the array, at the very least it lowers processing and network time every so tiny slightly. :-) |
The issue is that the jwt-go library doesn’t support that very well at the moment. I’ll check into that again to confirm.
… On 6. Sep 2018, at 17:51, OvermindDL1 ***@***.***> wrote:
Regarding string/array - array MUST be supported according to spec. String MAY be supported, see JWT spec:
Yep, I've already submitted a PR to them. Just curious if there is a way to just send a single string regardless when there is only a single string in the array, at the very least it lowers processing and network time every so tiny slightly. :-)
—
You are receiving this because you modified the open/close state.
Reply to this email directly, view it on GitHub, or mute the thread.
|
I think that was a similar issue the library itself had, they ended up writing their own (obviously incomplete) JWT handler, my fix for this issue for them is at: markbates/goth#240 |
In our setup, we have a backend and frontend service that are both issued different client ids.
Once logged into the frontend service, we have an ID token with
{aud: "frontend"}
, but it cannot be used to make requests to the backend service, because theaud
claim must match the client_id of the backend service.OpenID Connect claims docs:
Looks like #314 took care of making the claim an array, so presumably this would involve an addition to
AcceptOAuth2ConsentRequest
, potentially just a special case for whenaud
is included inAccess/IdTokenExtra
?The text was updated successfully, but these errors were encountered: