Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use configured required claims to verify OIDC introspection responses #43975

Closed
sschellh opened this issue Oct 19, 2024 · 1 comment · Fixed by #44170
Closed

Use configured required claims to verify OIDC introspection responses #43975

sschellh opened this issue Oct 19, 2024 · 1 comment · Fixed by #44170
Assignees
Labels
area/oidc kind/enhancement New feature or request
Milestone

Comments

@sschellh
Copy link

Description

When using quarkus-oidc and the bearer access token is opaque/binary and is remotely introspected/verified by the OIDC provider, then the properties in the introspection response are not handled the same ways as the claims in JWT access token.

This results in properties like quarkus.oidc.token.required-claims.realm=value not being honored, if access token is opaque.

Implementation ideas

No response

@sschellh sschellh added the kind/enhancement New feature or request label Oct 19, 2024
Copy link

quarkus-bot bot commented Oct 19, 2024

/cc @pedroigor (oidc), @radcortez (config), @sberyozkin (oidc)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/oidc kind/enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants