-
Notifications
You must be signed in to change notification settings - Fork 2.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Expose potential extension points on authorization code flow-related provider clients #27482
Comments
/cc @pedroigor |
@FelixMundial Will that work for you ? |
Thank you for your instant reply! |
@FelixMundial Np, adding the configuration properties is the simplest approach and trying to make it more complex without real need for it is not needed IMHO - doing the extra grant handlers will increase the margin of a user error and complicate the already complex |
@sberyozkin Then this enhancement is currently the best option for it, thank you very much for your explanation and help🥳🥳 |
@FelixMundial Np, I'll let you know when PR is available, once I get to it... |
@FelixMundial FYI, #27482 will close this issue once approved/merged. It can be of general interest - but please give it a try and re-open the issue if some extra customizations may be necessary |
OK, sure :) |
Description
Our self-hosted authorization server is based largely upon basic authorization code flow backed by OIDC, but slightly modified the "code -> token" process as several non-standard parameters are required, which are primarily headers and bodies for signature submission intended for customized client authentication based on methods other than the standard ones like base/post/jwt or secret_key_jwt, for the exchange of id/access/refresh tokens.
This whole process is not at all universal in terms of keycloak or other well-known providers, but the ability of extention/decoration of the authorization code flow would be of benefit.
Thank you for your time :))
Implementation ideas
In
io.quarkus.oidc.runtime.OidcProviderClient#getHttpResponse(String, MultiMap)
, it seems that headers and bodies are not somewhat customizable, I wonder if it's feasible to enable passage of customized header/body values to the http client, through configuration properties.Or is it possible to enable decoration of the whole
io.quarkus.oidc.runtime.CodeAuthenticationMechanism
, through conditional injection of user-definedOidcProviderClient
s.The text was updated successfully, but these errors were encountered: