-
Notifications
You must be signed in to change notification settings - Fork 186
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
proxy tries to verify OIDC access_token using the reva jwt secret #3841
Comments
addressed in #4135 |
rhafer
added a commit
to rhafer/ocis
that referenced
this issue
Jul 22, 2022
We try to parse the access token as a JWT now. Verifying the signature using the keys downloaded from the jwks_uri of the IDP. Currently we only use it to extract the expiry information from the JWT. This could be reworked to extract other claims from the token for authorization purposes. Fixes: owncloud#3841
rhafer
added a commit
to rhafer/ocis
that referenced
this issue
Jul 25, 2022
We try to parse the access token as a JWT now. Verifying the signature using the keys downloaded from the jwks_uri of the IDP. Currently we only use it to extract the expiry information from the JWT. This could be reworked to extract other claims from the token for authorization purposes. Fixes: owncloud#3841
rhafer
added a commit
to rhafer/ocis
that referenced
this issue
Jul 25, 2022
We try to parse the access token as a JWT now. Verifying the signature using the keys downloaded from the jwks_uri of the IDP. Currently we only use it to extract the expiry information from the JWT. This could be reworked to extract other claims from the token for authorization purposes. Fixes: owncloud#3841
rhafer
added a commit
to rhafer/ocis
that referenced
this issue
Aug 2, 2022
We try to parse the access token as a JWT now. Verifying the signature using the keys downloaded from the jwks_uri of the IDP. Currently we only use it to extract the expiry information from the JWT. This could be reworked to extract other claims from the token for authorization purposes. Fixes: owncloud#3841
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
ocis/extensions/proxy/pkg/middleware/oidc_auth.go
Line 130 in a0f5c7a
This can't work. We'd need to fetch the keys from the
jwks_uri
(as defined in the.well-know/openid-configuration
) and use that for verifying the access_token signature or, depending on the IDP use the introspection endpoint to extract the needed data from the access token. I think currently this "just" breaks the userinfo cache.The text was updated successfully, but these errors were encountered: